Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
The
used abbreviations and acronyms original text and the overall approach, including
INTERNET
ccTLD country code Top-Level Domain
and communications technology (ICT) policy
CIDR Classless Inter-Domain Routing
for government officials from Commonwealth
DMCA Digital Millennium Copyright Act
countries. In 2004, Diplo published a print version
DNS Domain Name System
of its Internet governance materials, in a booklet
GOVERNANCE
DRM Digital Rights Management
entitled Internet Governance Issues, Actors and
GAC Governmental Advisory Committee
Divides. This booklet formed part of the Information
gTLD generic Top-Level Domain Society Library, a Diplo initiative driven by Stefano
HTML HyperText Markup Language Baldi, Eduardo Gelbstein, and Jovan Kurbalija.
IANA Internet Assigned Numbers Authority Special thanks are due to Eduardo Gelbstein, who
ICANN Internet Corporation for Assigned made substantive contributions to the sections
Names and Numbers
dealing with cybersecurity, spam, and privacy, and
Jovan Kurbalija
ICC International Chamber of Commerce
AN INTRODUCTION TO INTERNET GOVERNANCE Jovan Kurbalija to Vladimir Radunovic, Ginger Paque, and Stephanie
aICT Information and Communications
Borg-Psaila who updated the course materials.
Technology
Comments and suggestions from other colleagues
IDN Internationalized Domain Name
are acknowledged in the text. Stefano Baldi, Eduardo
IETF Internet Engineering Task Force
An Introduction to Internet Governance provides a comprehensive overview Gelbstein, and Vladimir Radunovic all contributed
IGF Internet Governance Forum
of the main issues and actors in this field. The book is written in a clear and significantly to developing the concepts behind
IP Internet Protocol
accessible way, supplemented with numerous figures and illustrations. It the illustrations in the book. In 2008, a special,
IPR Intellectual Property Rights
revised version of the book, entitled simply An
ISOC Internet Society focuses on technical, legal, economic, development, and sociocultural aspects
Introduction to Internet Governance, was published
ISP Internet Service Provider of Internet governance, providing a brief introduction, a summary of major in cooperation with NIXI India on the occasion of
ITU International Telecommunication Union questions and controversies, and a survey of different views and approaches the Internet Governance Forum (IGF) 2008 held in
IXP Internet eXchange Point for each issue. The book offers a practical framework for analysis and Hyderabad, India. In 2009, a revised third edition
Jovan Kurbalija
MoU Memorandum of Understanding was published in the cooperation with the Ministry
discussion of Internet governance.
OECD Organisation for Economic Co-operation of Communication and Information Technology of
and Development
Egypt Internet Governance. The fourth edition (2010)
PKI Public Key Infrastructure Since 1997 more than 1500 diplomats, computer specialists, civil society
was produced in partnership with the Secretariat
S&T Science and Technology activists, and academics have attended training courses based on the text and of the Africa-Caribbean-Pacific Group of Countries
SGML Standard Generalized Markup Language approach presented in this book. With every delivery of the course, materials and the European Union. The fifth edition (2012)
sTLD sponsored Top-Level Domain are updated and improved. This regular updating makes the book particularly was published in cooperation with the Azerbaijan
TCP/IP Transmission Control Protocol/ Diplomatic Academy (ADA).
Internet Protocol
useful as a teaching resource for introductory studies in Internet governance.
TLD Top-Level Domain
TRIPS Trade-Related Aspects of Intellectual
Property Rights
UDHR Universal Declaration of Human Rights
UDRP Uniform Domain-Name Dispute-Resolution
Policy
UNECOSOC United Nations Economic and Social Council
UNCITRAL United Nations Commission on
International Trade Law
UNESCO United Nations Educational, Scientific
and Cultural Organization
VoIP Voice-over Internet Protocol
6th Edition
W3C World Wide Web Consortium
WGIG Working Group on Internet Governance
WIPO World Intellectual Property Organization
WSIS World Summit on the Information Society
6th Edition
XML eXtensible Markup Language
The history of this book is long, in Internet time. The For easy reference: a list of frequently
original text and the overall approach, including used abbreviations and acronyms
the five-basket methodology, were developed
APEC Asia-Pacific Economic Co-operation
in 1997 for a training course on information
ccTLD country code Top-Level Domain
and communications technology (ICT) policy
CIDR Classless Inter-Domain Routing
for government officials from Commonwealth
DMCA Digital Millennium Copyright Act
countries. In 2004, Diplo published a print version
DNS Domain Name System
of its Internet governance materials, in a booklet
DRM Digital Rights Management
entitled Internet Governance Issues, Actors and
GAC Governmental Advisory Committee
Divides. This booklet formed part of the Information
Society Library, a Diplo initiative driven by Stefano gTLD generic Top-Level Domain
Baldi, Eduardo Gelbstein, and Jovan Kurbalija. HTML HyperText Markup Language
Special thanks are due to Eduardo Gelbstein, who IANA Internet Assigned Numbers Authority
made substantive contributions to the sections ICANN Internet Corporation for Assigned
Names and Numbers
dealing with cybersecurity, spam, and privacy, and
ICC International Chamber of Commerce
to Vladimir Radunovic, Ginger Paque, and Stephanie
aICT Information and Communications
Borg-Psaila who updated the course materials.
Technology
Comments and suggestions from other colleagues
IDN Internationalized Domain Name
are acknowledged in the text. Stefano Baldi, Eduardo
IETF Internet Engineering Task Force
Gelbstein, and Vladimir Radunovic all contributed
IGF Internet Governance Forum
significantly to developing the concepts behind
IP Internet Protocol
the illustrations in the book. In 2008, a special,
IPR Intellectual Property Rights
revised version of the book, entitled simply An
Introduction to Internet Governance, was published ISOC Internet Society
in cooperation with NIXI India on the occasion of ISP Internet Service Provider
the Internet Governance Forum (IGF) 2008 held in ITU International Telecommunication Union
Hyderabad, India. In 2009, a revised third edition IXP Internet eXchange Point
was published in the cooperation with the Ministry MoU Memorandum of Understanding
of Communication and Information Technology of OECD Organisation for Economic Co-operation
and Development
Egypt Internet Governance. The fourth edition (2010)
was produced in partnership with the Secretariat PKI Public Key Infrastructure
of the Africa-Caribbean-Pacific Group of Countries S&T Science and Technology
and the European Union. The fifth edition (2012) SGML Standard Generalized Markup Language
was published in cooperation with the Azerbaijan sTLD sponsored Top-Level Domain
Diplomatic Academy (ADA). TCP/IP Transmission Control Protocol/
Internet Protocol
TLD Top-Level Domain
TRIPS Trade-Related Aspects of Intellectual
Property Rights
UDHR Universal Declaration of Human Rights
UDRP Uniform Domain-Name Dispute-Resolution
Policy
UNECOSOC United Nations Economic and Social Council
UNCITRAL United Nations Commission on
International Trade Law
UNESCO United Nations Educational, Scientific
and Cultural Organization
VoIP Voice-over Internet Protocol
W3C World Wide Web Consortium
WGIG Working Group on Internet Governance
WIPO World Intellectual Property Organization
WSIS World Summit on the Information Society
XML eXtensible Markup Language
AN INTRODUCTION TO
INTERNET
GOVERNANCE
Jovan Kurbalija
6th Edition
Published by DiploFoundation (2014)
The translation and publication of this book in other languages is encouraged. For more
information, please contact diplo@diplomacy.edu
Any reference to a particular product in this book serves merely as an example and should not be
considered an endorsement or recommendation of the product itself.
ISBN: 978-99932-53-28-0
Contents
Foreword..................................................................................................................................................... 1
Section 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
What does Internet governance mean?....................................................................................................... 5
The evolution of Internet governance.......................................................................................................... 7
The Internet Governance Cognitive Toolkit.............................................................................................. 15
Approaches and patterns........................................................................................................................... 17
Analogies................................................................................................................................................... 23
Classification of Internet governance issues.............................................................................................. 28
Endnotes................................................................................................................................................... 31
Today, just ten years later, the same people who asked me to install their
printers are coming back to me with questions about how to keep ownership
of their data on Facebook or how to ensure their children can navigate the
Internet safely. Increasingly, they are concerned about a possible cyberwar and
the online risks for water supply, power plants, and other critical infrastructure
in their cities and countries. How far we all have come!
Internet governance is moving increasingly into the public eye. The more
modern society depends on the Internet, the more relevant Internet
governance will be. Far from being the remit of some select few, Internet
governance concerns all of us to a lesser or greater extent, whether we are
one of the 2.9 billion using the Internet or a non-user who depends on the
facilities it services.
Internet governance is obviously more relevant for those who are deeply
integrated in the e-world, whether through e-business or networking on
Facebook. Yet it has a broad reach. Government officials, military personnel,
lawyers, diplomats, and others who are involved in either providing public
goods or preserving public stability are also concerned. Internet governance,
and in particular the protection of privacy and other human rights, is a focal
point for civil society activists and non-governmental organisations. For
academia and innovators worldwide, Internet governance must ensure that the
Internet remains open for development and innovation. Creative inventors of
1
Internet Governance
tomorrows Google, Skype, Facebook, and Twitter are out there, somewhere,
browsing the Net. Their creativity and innovativeness should not be stifled;
rather they should be encouraged to develop new, more creative ways to use
the Internet.
Jovan Kurbalija
Director of DiploFoundation
Head of the Geneva Internet Platform
September 2014
2
Chapitre 1
Introduction
Although Internet governance deals with the core of the digital world,
governance cannot be handled with a digital-binary logic of true/false
and good/bad. Instead, Internet governance demands many subtleties
and shades of meaning and perception; it thus requires an analogue
approach, covering a continuum of options and compromises.
4
Introduction
Introduction
T
he controversy surrounding Internet governance starts with its
definition. Its not merely linguistic pedantry. The way the Internet is
defined reflects different perspectives, approaches, and policy interests.
Typically, telecommunication specialists see Internet governance through the
prism of the development of a technical infrastructure. Computer specialists
focus on the development of different standards and applications, such as
XML (eXtensible Markup Language) or Java. Communication specialists
stress the facilitation of communication. Human rights activists view Internet
governance from the perspective of freedom of expression, privacy, and
other basic human rights. Lawyers concentrate on jurisdiction and dispute
resolution. Politicians worldwide usually focus on issues that resonate
with their electorates, such as techno-optimism (more computers = more
education) and threats (Internet security, child protection). Diplomats are
mainly concerned with the process and protection of national interests. The
list of potentially conflicting professional perspectives of Internet governance
goes on.
The World Summit on the Information Society (WSIS)1 came up with the
following working definition of Internet governance:
This rather broad working definition does not resolve the question of different
interpretations of two key terms: Internet and governance.
5
Internet Governance
Back in 2003, The Economist magazine started writing Internet with a lowercase i.
This change in editorial policy was inspired by the fact that the Internet had become
an everyday item, no longer unique and special enough to warrant an initial capital.
The word Internet followed the linguistic destiny of (t)elegraph, (t)elephone, (r)adio,
and (t)elevison, and other such inventions.
Internet
The term Internet does not cover all of the existing aspects of global digital
developments. Two other terms information society and information
and communication technology (ICT) are usually put forward as more
comprehensive. They include areas that are outside the Internet domain, such
as mobile telephony. The argument for the use of the term Internet, however,
is enhanced by the rapid transition of global communication towards the use
of Internet protocol (IP) as the main communications technical standard.
The already ubiquitous Internet continues to expand at a rapid rate, not only
in terms of the number of users but also in terms of the services that it offers,
notably voice-over Internet protocol (VoIP), which may displace conventional
telephony.
Governance
In the Internet governance debate, especially in the early phase of
WSIS 2003, controversy arose over the term governance and its various
interpretations. According to one interpretation, governance is synonymous
with government. Many national delegations had this initial understanding,
leading to the interpretation that Internet governance should be the business
of governments and consequently addressed at intergovernmental level
with the limited participation of other, mainly non-state actors.4 This
interpretation clashed with a broader meaning of the term governance,
which includes the governance of affairs of any institution, including non-
governmental ones.
6
Introduction
This was the meaning accepted by Internet communities, since it describes the
way in which the Internet has been governed since its early days.
This led many people to think that the Internet was somehow unique and that
it could offer an alternative to the politics of the modern world. In his famous
Declaration of the Independence of Cyberspace, John Perry Barlow said:
7
Internet Governance
This war brought new players into the picture: international organisations and
nation states. It ended in 1998 with the establishment of a new organisation,
the Internet Corporation for Assigned Names and Numbers (ICANN), which
has become the focus of most Internet governance debates today.
Developments in 2006
After the Tunis summit, three main developments and events marked the
Internet governance debate in 2006. First was the expiration of the existing
Memorandum of Understanding (MoU) and the establishment of a new one
between ICANN and the US Department of Commerce. Some had hoped
that this event would change the relationship between ICANN and the US
government and that the former would become a new type of international
organisation. However, while the new MoU thinned the umbilical cord
between ICANN and the US government, it maintained the possibility of the
eventual internationalisation of ICANNs status.
8
Introduction
The second event of 2006 was the Internet Governance Forum (IGF)
in Athens. It was the first such forum and, in many respects, it was an
experiment in multilateral diplomacy.
Developments in 2007
In 2007, the ICANN discussion focused on .xxx domains (for adult materials),
re-opening debates on numerous governance points, including whether
ICANN should deal only with technical problems or also with issues having
public policy relevance.7 Interventions by the USA and other governments
pertaining to .xxx domains further raised the question of how national
governments should become involved in ICANN deliberations. At the second
IGF, held in November in Rio de Janeiro, the main development was adding
critical Internet resources (names and numbers) to the IGF agenda.
Developments in 2008
The major development of 2008, which continued to influence Internet
governance as well as other policy spheres, was the election of Barack Obama
as US President. During his presidential election campaign, President Obama
used the Internet and Web 2.0 tools intensively. Some even argue that this
was one of the reasons for his success. His advisors include many people
from the Internet industry, including the CEO of Google. In addition to
his techno-awareness, President Obama supports multilateralism which is
likely to influence discussions on the internationalisation of ICANN and the
development of the Internet governance regime.
9
Internet Governance
Another major development was the fast growth of Facebook and social
networking. When it comes to Internet governance, the increased use of
Web 2.0 tools opened up the issue of privacy and data protection on Facebook
and similar services.
Developments in 2009
The first part of 2009 saw the Washington Belt trying to figure out the
implications and future directions of President Obamas Internet-related
policy. His appointments to key Internet-related positions did not bring any
major surprises. They followed his support for an open Internet. His team
also pushed for the implementation of the principle of network neutrality in
accordance with promises made during his election campaign.
In November 2009, the fourth IGF was held in Sharm el Sheikh, Egypt. The
main theme was the IGFs future in view of the 2010 review of its mandate.
In their submissions, stakeholders took a wide range of views on the future
of the IGF. While most of them supported its continuation, there were
major differences of opinion as to how the future IGF should be organised.
China and many developing countries argued for the stronger anchoring of
the IGF in the UN system, which would imply a more prominent role for
governments. The USA, most developing countries, the business sector, and
civil society argued for the preservation of the current IGF model.
10
Introduction
Developments in 2010
The main development in 2010 was the impact of fast-growing social media
on the Internet governance debate, including the protection of privacy of users
of social media platforms such as Facebook. In 2010, the main development
in Internet geo-politics was US Secretary of State Hillary Clintons speech
on freedom of expression on the Internet, in particular in relation to China.9
Google and Chinese authorities conflicted over the restricted access to
Google-search in China. The conflict led to the closing of Googles search
operations in China.
There were two important developments in the ICANN world. First was the
introduction of non-ASCII domain names for Arabic and Chinese. By solving
the problem of domain names in other languages, ICANN reduced the risk of
the disintegration of the Internet DNS. Second was ICANNs approval of the
.xxx domain (adult materials). With this decision ICANN formally crossed
the Rubicon by officially adopting a decision of high relevance for public
policy on the Internet. Previously, ICANN had tried to stay, at least formally,
within the realm of making only technical decisions.
The IGF review process started in 2010 with the UN Commission on Science
and Development adopting the resolution on the continuation of the Forum,
which suggested continuation for the next five years, with only minor changes
in its organisation and structure. In July 2010, the UN Economic and Social
Council (ECOSOC) endorsed this resolution. The UN General Assembly
decided in the autumn of 2010 to continue the IGF for the next five years
(20112015).
Developments in 2011
In 2011, the main general development was the rise of Internet governance
higher on the global politics agenda. The relevance of Internet governance
moved closer to other diplomatic issues such as climate change, migration,
and food security. Another consequence of the growing political relevance of
the Internet is the gradual shift of national coverage of Internet governance
issues from technology (IT, telecoms) to political ministries (diplomacy, prime
ministerial cabinets). In addition, the main global media (e.g. The Economist,
IHT, Al Jazeera, the BBC) were now following Internet governance
developments more closely than ever before.
Internet governance was affected by the Arab Spring. Although there are very
different views on the impact of the Internet on the Arab Spring phenomenon
(ranging from minimal to key), one outcome is certain: social media is now
perceived as a decisive tool in modern political life. In various ways, the
11
Internet Governance
In 2011, ICANN continued its soul searching with the following main
developments:
P Implementation of management reform.
P Final policy preparations for the introduction of new generic top-level
domains (gTLDs).
P The resignation of its CEO and the search for a replacement.
Developments in 2012
Two major events marked the 2012 agenda with important consequences
for the years to come: the ICANN leadership change and the revision of the
ITUs International Telecommunication Regulations (ITRs).
12
Introduction
Developments in 2013
The main development in global digital politics was the Snowden revelations
on the various surveillance programmes run by the US National Security
Agency (NSA) and other agencies. The Snowden revelations made the global
public interested in how the Internet is governed. The main focus was on the
question of data protection and rights of privacy.
13
Internet Governance
The prefixes e- / virtual / cyber / digital / net are used to describe various ICT/Internet
developments. They are used interchangeably. Each prefix describes the Internet
phenomenon.
Yet, we tend to use e- for commerce, cyber for crime and security, digital for
development divides, and virtual for currencies, such as Bitcoin. Usage patterns have
started to emerge. While in our everyday language, the choice of prefixes e- / virtual
/ cyber / digital / net is casual, in Internet politics the use of prefixes has started to
attract more meaning and relevance.
Lets have a quick look at the etymology of these terms and the way they are used in
Internet politics.
The etymology of cyber goes back to the Ancient Greek meaning of governing.
Cyber came to our time via Norbert Weiners book Cybernetics, dealing with
information-driven governance. In 1984, William Gibson coined the word cyberspace
in the science-fiction novel Neuromancer. The growth in the use of the prefix cyber
followed the growth of the Internet. In the late 1990s almost anything related to the
Internet was cyber: cybercommunity, cyberlaw, cybersex, cybercrime, cyberculture,
cyber If you named anything on the Internet and you had cyber. In the early
2000s, cyber gradually disappeared from wider use, only remaining alive in security
terminology.
Cyber was used to name the 2001 Council of Europe Cybercrime Convention. It is still
the only international treaty in the field of Internet security. Today there is the USAs
Cyberspace Strategy, the ITUs Global Cybersecurity Agenda; NATOs Cyber defense
policy, Estonias Cyber Defence Center of Excellence ...).
Cyberpunk author and Wired columnist Bruce Sterling had this to say:
I think I know why the military calls it cyber its because the metaphor
of defending a battlespace made of cyberspace makes it easier for
certain contractors to get Pentagon grants. If you call cyberspace by the
alternate paradigm of networks, wires, tubes and cables then the NSA has
already owned that for fifty years and the armed services cant get a word
in.10
E is the abbreviation for electronic. It got its first and most important use through
e-commerce, as a description of the early commercialisation of the Internet. In the
EUs Lisbon Agenda (2000), e- was the most frequently used prefix. E- was also the
main prefix in the WSIS declarations (Geneva 2003; Tunis 2005). The WSIS follow-
up implementation is centred on action lines including e-government,e-business,
e-learning, e-health, e-employment, e-agriculture, and e-science. Nonetheless, e- is
not as present as it used to be. Even the EU has abandoned e- recently, trying, most
likely, to distance itself from the failure of the its Lisbon Agenda.
14
Introduction
Today, the EU has a Digital Agenda for Europe.11 Digital refers to 1 and 0 two
digits which are the basis of whole Internet world. Ultimately, all software and
programmes start with them. In the past, digital was used mainly in development
circles to represent the digital divide. During the last few years, digital has started
conquering Internet linguistic space. It is likely to remain the main Internet prefix.
J-C Juncker, President-elect of the European Commission used the digital prefix
10 times in his speech at the European Parliament, presenting his policy plan for the
next five years. In addition to the EU, Great Britain now has has digital diplomacy.
Virtual relates to the intangible nature of the Internet. Virtual introduces the ambiguity
of being both intangible and, potentially, non-existent. Virtual reality could be both an
intangible reality, (something that cannot be touched) and a reality that does not exist
(a false reality). Academics and Internet pioneers used virtual to highlight the novelty
of the Internet, and the emergence of a brave new world. Virtual, because of its
ambigious meaning, rarely appears in policy language and international documents.
Today, there is truce in the war for prefix dominance.
Each prefix carves its own domain, without a catch-all domination which, for
example, cyber had in the late 1990s. Today, cyber preserves its dominance in security
matters. E- is still the preferred prefix for business. Digital has evolved
from development issue use to wider use by the government sector. Virtual has
been virtually abandoned.
15
Internet Governance
Like the Internet governance process, the toolkit is also in flux. Approaches,
patterns, and analogies emerge and disappear depending on their current
relevance in the policy process. They support specific policy narratives in the
Internet governance debate.
Figure 1
16
Introduction
With the growth of the Internet and the emergence of new Internet governance
actors mainly the business sector and governments it was difficult for the
Internet community to maintain an integrated coverage of technical and policy
issues under one roof. Subsequent reforms, including the creation of ICANN,
have tried to re-establish coherence between technical and policy aspects. This
issue remains open, and as expected, has shown to be one of the controversial
topics in the debate on the future of Internet governance.
17
Internet Governance
The centralised approach, on the other hand, is partly based on the practical
difficulty of countries with limited human and financial resources to follow
Internet governance discussions in a highly decentralised and multi-
institutional setting. Such countries find it difficult to attend meetings in the
main diplomatic centres (Geneva, New York), let alone to follow the activities
of other institutions, such as ICANN, W3C (World Wide Web Consortium),
and IETF. These mainly developing countries argue for a one-stop shop,
preferably within the framework of an international organisation.
18
Introduction
Today, it is still difficult to identify exactly who is behind the screen but it
is fairly straightforward to identify their geographical location. The more
the Internet is anchored in geography, the less unique its governance is. For
example, with the possibility of geographically locating Internet users and
transactions, the complex question of jurisdiction on the Internet can be
solved through existing laws.
Policy uncertainty
Internet technology develops very quickly. New services are introduced almost
on daily basis. This creates additional difficulties in organising the Internet
governance debate. For example, in November 2005, when the current
Internet governance arrangement was negotiated at WSIS in Tunisia,14
Twitter did not exist. Today, Twitter has triggered some of the core Internet
governance issues, such as protection of privacy, freedom of expression, and
protection of intellectual property.
19
Internet Governance
Many criticise these balancing pairs, considering them false dilemmas. For
example, there are strong arguments that more cybersecurity does not necessarily
mean less privacy. There are approaches towards enhancing both cybersecurity and
privacy. While these views are strongly held, the reality of Internet governance
policy is that it is shaped by the aforementioned binary policy options.
20
Introduction
The use of existing rules would significantly increase legal stability and reduce
the complexity of the development of the Internet governance regime.
The stability of the Internet should be preserved through the early Internet
approach of running code, which involves the gradual introduction of well-
tested changes in the technical infrastructure. However, some actors are
concerned that the use of the slogan if it aint broke, dont fix it will provide
blanket immunity from any changes in the current Internet governance,
including changes not necessarily related to technical infrastructure. One
solution is to use this principle as a criterion for the evaluation of specific
Internet-governance-related decisions (e.g. the introduction of new protocols
and changes in decision-making mechanisms).
While maintaining a
holistic approach to Internet
governance negotiations,
stakeholders should identify
priority issues depending
on their particular interests.
Neither developing nor
developed countries are
homogenous groups.
21
Internet Governance
22
Introduction
use of firewall technologies for restricting the flow of information, prove that
technology can be used in many, seemingly contradictory, ways. Whenever
possible, principles such as free communication should be clearly stated at policy
level, not tacitly presumed at technical level. Technological solutions should
strengthen policy principles, but should not be the only way to promote them.
Analogies
Though analogy is often misleading,
it is the least misleading thing we have.
Samuel Butler, British Poet (18351902)
23
Internet Governance
Internet telephony
Similarities: In the early Internet days, this analogy was influenced by the fact
that the telephone was used for dial-up access to the Internet. In addition, a
functional analogy holds between the telephone and the Internet (e-mail and
chat), both being means for direct and personal communication.
Used by: This analogy is used by those who oppose the regulation of Internet
content (mainly in the USA). If the Internet were analogous to the telephone,
the content of Internet communication cannot be legally controlled, unlike for
example broadcasting. It is also used by those who argue that the Internet
should be governed like other communication systems (e.g. telephony, post), by
national authorities with a coordinating role of international organisations, such
as the ITU. According to this analogy, the Internet DNS should be organised
and managed like the telephony numbering system.15
A new twist in the complex analogy was created by VoIP (e.g. Skype) which
performs the function of the telephone while using Internet protocols. This
dichotomy triggered a policy controversy at the 2012 World Conference on
International Telecommunications (WCIT) in Dubai. The current view that
VoIP is the Internet service is challenged by those who argue that it should
be regulated like telephone service on both national and international level,
including a more prominent role for the ITU.
Internet mail/post
Similarities: Here is an analogy in function, namely the delivery of messages.
The name itself, e-mail, highlights this similarity.
24
Introduction
Paul Twomy, former CEO of ICANN, used the following analogy between the postal
system and ICANNs function: If you think of the Internet as a post office or a postal
system, domain name and IP addressing are essentially ensuring that the addresses
on the front of an envelope work. They are not about what you put inside the envelope,
who sends the envelope, whos allowed to read the envelope, how long it takes for
the envelope to get there, what is the price of the envelope. None of those issues are
important for ICANNs functions. The function is focusing on just ensuring that the
address works.
Differences: This analogy covers only one Internet service: e-mail. Moreover,
the postal service has a much more elaborate intermediary structure between
the sender and the recipient than the e-mail system, where the active
intermediary function is performed by ISPs or an e-mail service provider like
Yahoo! or Hotmail.
Used by: The Universal Postal Convention draws this analogy between mail
and e-mail: Electronic mail is a postal service which uses telecommunications
for transmitting. This analogy can have consequences concerning the delivery
of official documents. For instance, receiving a court decision via e-mail would
be considered an official delivery.
The families of US soldiers who died in Iraq have also attempted to make use
of the analogy between mail (letters) and e-mail in order to gain access to
their loved ones private e-mail and blogs, arguing that they should be allowed
to inherit e-mail and blogs as they would letters and diaries. ISPs have found
it difficult to deal with this highly emotional problem. Instead of going along
with the analogy between letters and e-mail, most ISPs have denied access
based on the privacy agreement they had signed with their users.
Internet television
Similarities: The initial analogy was related to the physical similarity between
computers and television screens. A more sophisticated analogy draws on the
use of both media web and TV for broadcasting.
25
Internet Governance
Used by: This analogy is used by those who want to introduce stricter content
control to the Internet. In their view, due to its power as a mass media
tool similar to television, the Internet should be strictly controlled. The US
government attempted to use this analogy in the seminal Reno vs ACLU
case. This case was prompted by the Communication Decency Act passed by
Congress, which stipulates strict content control in order to prevent children
from being exposed to pornographic materials via the Internet. The court
refused to recognise the television analogy.
Internet library
Similarities: The Internet is sometimes seen as a vast repository of information
and the term library is often used to describe it: for example, huge digital
library, cyberlibrary, Alexandrian Library of the twenty-first century, etc.
Differences: The storage of information and data is only one aspect of the
Internet, and there are considerable differences between libraries and the
Internet:
P Traditional libraries aim to serve individuals living in a particular place
(city, country, etc.), whereas the Internet is global.
P Books, articles, and journals are published using procedures to ensure
quality (editors). The Internet does not always have editors.
P Libraries are organised according to specific classification schemes,
allowing users to locate the books in their collections. There is no such
classification scheme for information on the Internet.
P Apart from keyword descriptions, the contents of a library (text in books
and articles) are not accessible until the user borrows a particular book or
journal. The content of the Internet is immediately accessible via search
engines.
Used by: This analogy is used by various projects that aim to create a
comprehensive system of information and knowledge on particular issues
(portals, databases, etc.). The library analogy has been used in the context of a
Google book project with the objective of digitalising all printed books.
26
Introduction
through the process of copy and paste. This, in turn, has made the
dissemination of information via the Internet much simpler.
Differences: The computer has a much broader function than the copying of
materials, although copying itself is much simpler on the Internet than with a
VCR or photocopier.
Used by: This analogy was used in the context of the US Digital Millennium
Copyright Act (DMCA), which penalises institutions that contribute to
the infringement of copyright (developing software for breaking copyright
protection, etc.). The counterargument in such cases was that software
developers, like VCR and photocopier manufacturers, cannot predict whether
their products will be used illegally.
This analogy was used in cases against the developers of Napster-style software
for peer-to-peer (P2P) sharing of files, such as Grokster and StreamCast.
Internet highway
Similarities: What the highway is for transportation in the real world, the
Internet is for communication in a virtual space.
Differences: Aside from the transportation aspect of the Internet, there are
no other similarities between the Internet and highways. The Internet moves
intangible materials (data), while highways facilitate the transportation of
goods and people.
Hamadoun Tour, the ITU Secretary General, used an analogy between highways
and the Internet by relating highways to telecommunications and the Internet
traffic to trucks or cars: I was giving a simple example, comparing Internet and
telecommunications to trucks or cars and highways. It is not because you own
the highways that you are going to own all the trucks or cars running on them,
and certainly not the goods that they are transporting, or vice versa. Its a simple
analogy. But in order to run your traffic smoothly, you need to know, when you are
building your roads, the weight, the height and the speed of the trucks, so that you
build the bridges accordingly. Otherwise, the system will not flow. For me, thats
the relationship between the Internet and the telecommunication world. They are
condemned to work together.16
27
Internet Governance
Used by: The highway analogy was used extensively in the mid-1990s, after
Al Gore allegedly coined the term information superhighway. The term
highway was also used by the German government in order to justify the
introduction of a stricter Internet content control law in June 1997:
Its a liberal law that has nothing to do with censorship but clearly sets the
conditions for what a provider can and cannot do. The Internet is a means
of transporting and distributing knowledge just as with highways, there
need to be guidelines for both kinds of traffic.17
Differences: Nowadays, it is clear that most of the Internet lies within some
national jurisdiction. The technical infrastructure through which Internet
traffic is channelled is owned by private and state companies, typically
telecommunication operators. The closest analogy to the Internet in the
maritime field would be a shipping companys transport containers.
When it comes to legal instruments, the Convention on the Law of the Sea
regulates activities beyond national jurisdiction, such as on the high seas. There
is nothing analogous in the field of Internet telecommunication.
Used by: This analogy is used by those who argue for the international
regulation of the Internet. Concretely speaking, this analogy suggests the
use of the old Roman law concept of res communis omnium (i.e., space as a
common heritage for humankind to be regulated and garnered by all nations)
on the Internet as it is used for regulating the high sea.
The practical need for classification was clearly demonstrated during the
WSIS process. In the first phase, during the lead-up to the Geneva summit
(2003), many players, including nation states, had difficulty grasping the
complexity of Internet governance. A conceptual mapping, provided by
28
Introduction
various academic inputs and the WGIG report, contributed towards more
efficient negotiations within the context of the WSIS process. The WGIG
report (2004) identified four main areas:
P Issues related to infrastructure and the management of critical Internet
resources.
P Issues related to the use of the Internet, including spam, network security,
and cybercrime.
P Issues relevant to the Internet but that have an impact much wider than
the Internet and for which existing organisations are responsible, such as
intellectual property rights (IPR) or international trade.
P Issues related to the developmental aspects of Internet governance, in
particular capacity building in developing countries.
The agenda for the first IGF held in Athens (2006) was built around the
following thematic areas: access, security, diversity, and openness. At the
second IGF in Rio de Janeiro (2007), a fifth thematic area was added to the
agenda: managing critical Internet resources. These five thematic areas have
influenced the agendas of all subsequent IGF meetings.
Figure 4
29
Internet Governance
where it became one of the less prominent themes within the Security
thematic area. Diplos classification of Internet governance groups the main
4050 issues into the following five baskets:
P Infrastructure and standardisation
P Legal
P Economic
P Development
P Sociocultural
30
Introduction
Endnotes
1
The UN General Assembly Resolution 56/183 (21 December 2001) endorsed the holding
of the World Summit on the Information Society (WSIS) in two phases. The first phase
took place in Geneva from 10 to 12 December 2003 and the second phase took place
in Tunis, from 16 to 18 November 2005. The objective of the first phase was to develop
and foster a clear statement of political will and to take concrete steps to establish the
foundations for an Information Society for all, reflecting all the different interests at stake.
More than 19 000 participants from 174 countries attended the summit and related events.
Source: http://www.itu.int/wsis/basic/about.html [accessed 21 January 2014].
2
The WGIG definition follows the pattern of frequently used definitions in the regime
theory. The founder of regime theory, Stephen D. Krasner, notes that: Regimes can
be defined as sets of implicit or explicit principles, norms, rules, and decision-making
procedures around which actors expectations converge in a given area of international
relations. Principles are beliefs of fact, causation, and rectitude. Norms are standards of
behaviour defined in terms of rights and obligations. Rules are specific prescriptions or
proscriptions for action. Decision-making procedures are prevailing practices for making
and implementing collective choice. Krasner S (1983) Introduction, in International
Regimes. Krasner SD (ed.), Cornell University Press: Ithaca, NY, USA.
3
Shannon V (2006) Whats in an i? International Herald Tribune, 3 December 2006.
Available at: http://www.nytimes.com/2006/12/03/technology/03iht-btitu.3755510.html
[accessed 21 January 2014].
4
The technological confusion was highlighted by the way the term governance was used by
some international organisations. For example, the term good governance has been used
by the World Bank to promote the reform of states by introducing more transparency,
reducing corruption, and increasing the efficiency of administration. In this context, the
term governance is directly related to core government functions.
5
Barlow JP (1996) A declaration of the independence of cyberspace. Available at: https://
projects.eff.org/~barlow/Declaration-Final.html [accessed 21 January 2014].
6
For the evolution of the use of the word Internet in the preparation for the WSIS Summit:
DiploFoundation (2003) The Emerging Language of ICT Diplomacy Key Words.
Available at http://archive1.diplomacy.edu/IS/Language/html/words.htm
[accessed 3 August 2014].
7
In June 2010, ICANN approved the .xxx top level domain name for adult material.
8
For more on network neutrality, see our explanatory video at
https://www.youtube.com/watch?v=R-uMbZFfJVU [accessed 12 February 2014].
9
Clinton H (2010) Remarks on Internet freedom. Available at
http://www.state.gov/secretary/20092013clinton/rm/2010/01/135519.htm
[accessed 21 January 2014].
10
Newitz A (2013) The bizarre evolution of the word cyber. Available at
http://io9.com/today-cyber-means-war-but-back-in-the-1990s-it-mean-1325671487
[accessed 3 August 2014].
11
European Commission (no date) Digital Agenda for Europe. Available at
http://ec.europa.eu/digital-agenda/ [accessed 3 August 2014].
31
Internet Governance
Cited in Helfand D (2001) Edpseak is in a class by itself. Los Angeles Times, 16 August.
12
Available at http://articles.latimes.com/2001/aug/16/news/mn-34814
[accessed 13 February 2014].
This section could not have been completed without discussion with Aldo Matteucci,
13
Diplos senior fellow, whose contrarian views on modern governance issues are a constant
reality check in Diplos teaching and research activities.
The WSIS process started with the first preparatory meeting held in July 2002 in Geneva.
14
The first summit was held in Geneva (December, 2003) and the second summit in Tunisia
(November, 2005).
Volker Kitz provides an argument for the analogy between administration of telephony
15
systems and Internet names and numbers. Kitz V (2004) ICANN may be the only game
in town, but Marina del Rey isnt the only town on Earth: Some thoughts on the so-called
uniqueness of the Internet. Available at http://studentorgs.law.smu.edu/Science-and-
Technology-Law-Review/Articles/Fall-2005/Kitz.aspx [accessed 21 January 2014].
Excerpts from the Secretary Generals speech delivered at the ICANN meeting in Cairo
16
The term basket was introduced into diplomatic practice during the Organization for
18
32
Section 2
The infrastructure
and standardisation
basket
Internet Governance
34
The infrastructure and standardisation basket
T
he infrastructure and standardisation basket includes the basic, mainly
technical, issues related to the running of the Internet. The main
criterion for putting an issue in this basket is its relevance to the basic
functionality of the Internet. There are two groups of issues here.
The first group includes the essential issues without which the Internet and
the World Wide Web (www) could not exist.1 These issues are grouped into
the following three layers:
Figure 5
35
Internet Governance
The second group consists of issues related to safeguarding the secure and
stable operation of the Internet infrastructure and includes cybersecurity,
encryption, and spam.
36
The infrastructure and standardisation basket
The roles of the ITU and the WTO are quite different. The ITU sets detailed
voluntary technical standards and telecommunication-specific international
regulations, and provides assistance to developing countries.6 The WTO
provides a framework for general market rules.7
The issues
37
Internet Governance
There are two potential problems with this view. One is practical and related
to the huge investments that telecommunications companies, especially in
Europe, made in acquiring the rights to operate third-generation mobile-
phone networks.11 The other issue is that if the spectrum becomes a free-for-
all, this does not necessarily mean that it will be used by many as a public
good. Rather, it will be utilised by actors that have technical capacities to
utilise free spectrum.
38
The infrastructure and standardisation basket
TCP/IP standards are set by the Internet Engineering Task Force (IETF).
Given the core relevance of these protocols to the Internet, they are carefully
guarded by the IETF. Any changes to TCP/IP require extensive prior
discussion and proof that they are an effective solution (i.e., the running code
principle).
IP numbers are unique numeric addresses that all computers connected to the
Internet must have. Two computers connected to the Internet cannot have
the same IP number. This makes IP numbers a potentially scarce resource.
The system for the distribution of IP numbers is hierarchically organised. At
the top is IANA (the Internet Assigned Numbers Authority a subsidiary
of the Internet Corporation for Assigned Names and Numbers ICANN),
which distributes blocks of IP numbers to the five regional Internet registries
(RIRs).13 RIRs distribute IP numbers to the local Internet registries (LIRs)
and national Internet registries (RIRs), which in turn distribute IP numbers
to smaller ISPs, companies, and individuals further down the ladder.
Figure 6
The issues
39
Internet Governance
Figure 7
One of the main challenges facing the deployment of IPv6 is the lack of
backward compatibility between IPv6 and IPv4. Networks using IPv6
cannot communicate directly to those, still dominant today, using IPv4.
Since it is very likely that networks using IPv4 and IPv6 will coexist during
the forthcoming period, it is important to ensure that new IPv6-based
networks do not remain islands. A technical solution will involve special
40
The infrastructure and standardisation basket
tunnelling between the two types of networks, which will cause more complex
routing on the Internet and a few other collateral problems.
Apart from the problem of transition, the policy framework for IPv6
distribution will require a proper distribution of IP numbers, demanding
the introduction of open and competitive mechanisms to address the needs
of end-users in the most optimal way. Even with the introduction of IPv6
an artificial scarcity of IP numbers could still arise, if those responsible for
allocating them at local level, such as ISPs, choose to abuse their power
and link such allocation to, for example, the purchase of other services, thus
affecting the availability and price of IP numbers.
Because the Internet architecture was not designed with security in mind,
incorporating intrinsic security will require substantial changes to the very
basis of the Internet, the TCP/IP. A new protocol (IPv6) provides some
security improvements, but still falls short of a comprehensive solution. Such
protection would require considerable modifications to TCP/IP.15
41
Internet Governance
The DNS includes three types of top-level domains: generic (gTLD), country
code (ccTLD), and sponsored (sTLD). gTLDs include domains that could
be obtained by anyone (.com, .info, .net, and .org). Since 2014 many other
gTLDs have been added like .pub, .( bazaar), .rentals, .ngo, or .
(game). sTLDs are limited to a specific group. For example, the sTLD .aero is
open for registration only for air-transport industry. ccTLDs are designating
specific countries or territories (.uk, .cn, .in).
For each gTLD there is one registry that maintains an address list. For
example, the .com gTLD is managed by VeriSign. The salesman function is
performed by registrars. ICANN provides overall coordination of the DNS
system by concluding agreements and accrediting registries and registrars.
An important part of DNS management is the protection of trademarks and
dispute resolution. The first-come-first-served principle of domain name
allocation used in the early days of the Internet triggered the phenomenon
known as cybersquatting, the practice of
registering domain names that could be resold See Section 3 for
later. The Uniform Dispute Resolution Policy further discussion on
(UDRP) developed by ICANN and the World intellectual property
Intellectual Property Organization (WIPO)
42
The infrastructure and standardisation basket
Figure 8
The issues
43
Internet Governance
programme, any organisation in the world could apply to run a new gTLD
registry, including in non-Latin language scripts. The main opposition to the
creation of new gTLDs originated from the trademark lobby, concerned about
the protection of their trademarks in the context of the increasing number
of domains and the increase of cybersquatting. Although the debate on the
introduction of new gTLDs continues, the programme is up and running.
Intellectual property was not the only concern in this process. The most
illustrative situation was the proposal to introduce the .xxx domain for adult
materials.18 Initiated first in 2000 and resubmitted in 2004, the proposal
was rejected by the ICANN Board in March 2007. The main criticism
of this decision was that ICANN made it under pressure from the US
government, which strongly opposed its introduction.19 Such a move by the
US government resulted in a wide range of reactions. Among them were
sceptical voices stating that .xxx wouldnt be attractive to the Internet sex
business because of the risk of being heavily filtered. The issue was revisited in
June 2010 following a new submission; the ICANN Board positively reviewed
the application for the .xxx domain, which was finally approved as an sTLD
in 2011. This decision also re-opened the discussion about ICANNs role in
public policy issues.
44
The infrastructure and standardisation basket
The second issue concerns who should manage ccTLDs. Many countries have
been trying to gain control over their country domains, which are considered
to be national resources. National governments have chosen a wide variety of
policy approaches.24 Transition (re-delegation) to a new institution managing
the ccTLD (delegee) within each country is approved by ICANN only if there
is no opposition from any of the interested stakeholders within the country.
Given the importance of this issue and the wide variety of approaches, there
were two important initiatives at international level to introduce a certain level
of harmonisation. The first, the GAC Principles,25 was adopted by ICANNs
GAC, which proposed policy and specified procedures for the re-delegation of
ccTLD administration. The second was Best Practices, proposed by the World
Wide Alliance of Top-Level Domains ( June 2001).
The third issue is related to the reluctance of many country domain operators
to become part of the ICANN system. So far, ICANN has not managed
to gather country domain operators under its umbrella. Country domain
operators are organised at regional level (Europe CENTR, Africa
AFTLD, Asia APTLD, North America NATLD, and South America
LACTLD). ICANN is developing Accountability Frameworks as a less
formal way of developing links with the country domain operators.
In May 2010, after a long testing period and political uncertainties, ICANN
started approving TLDs in a wide variety of scripts, including Chinese,
Arabic, and Cyrillic. The introduction of internationalised domain names
45
Internet Governance
Root servers
At the top of the DNS hierarchical structure, root servers attract a lot of
attention. They attract most attention in policy and academic discussion on
Internet governance issues.
Therefore, hundreds of domain name servers contain copies of the root zone
file and an immediate and catastrophic collapse of the Internet could not
occur. It would take some time before any serious functional consequences
would be noticed, during which time it would be possible to reactivate the
original servers or to create new ones.
46
The infrastructure and standardisation basket
The file in the master root server is then automatically replicated on all the
other root servers. Thus, it is theoretically possible for the US government to
introduce unilateral changes to the entire DNS. This is a source of concern for
many governments.
The issues
New possibilities for solutions are open with the announcement of the US
government (NTIA) to relinquish the supervision over IANA and pass to
new mechanisms/body. The transition process, that is expected to complete by
30 September 2015, should be guided by the following principles:30
P Support and enhance the multistakeholder model.
P Maintain the security, stability, and resiliency of the Internet DNS.
P Meet the needs and expectation of the global customers and partners of
the IANA services.
P Maintain the openness of the Internet.
47
Internet Governance
is that the current (single root server) system prevents the risk of the DNS
being used by some governments for censorship.31 However, the censorship
argument against changes in DNS policy is losing ground on a functional
basis. Governments do not need control over the DNS system or the root
zone file in order to introduce censorship. They already rely on more effective
tools, based on the filtering of Web traffic.
A more solid argument is that any alternative root servers could lead towards
the fragmentation and even, maybe, the ultimate disintegration of the Internet,
including one possible scenario of violent disintegration. The fragmentation
of the Internet could endanger one of the core functions of the Internet a
unified global communication system. How realistic is this danger? Vittorio
Bertola provides a very comprehensive analysis of this challenge.32
Since ISPs connect end-users to the Internet, they provide the most direct and
straightforward enforcement of legal rules on the Internet. This is why many
states have started concentrating their law enforcement efforts on ISPs.
The issues
48
The infrastructure and standardisation basket
from entering this market and inhibit competition. This results in higher
prices and often a lower QoS, and fails to reduce the digital divide. In some
cases, telecommunication monopolies tolerate the existence of other ISPs, but
interfere at operational level (e.g. by providing lower bandwidths or causing
disruptions in services).
The approach of placing limited liability on ISPs has been generally supported
by jurisprudence. Some of the most important cases where ISPs were freed
of responsibility for hosting materials in breach of copyright law are the
Scientology Case (the Netherlands),33 RIAA vs Verizon (United States),34
SOCAN vs CAIP (Canada),35 and more recently Scarlet vs SABAM
(Belgium).36
49
Internet Governance
The problem of spam exposes ISPs to new difficulties. For instance, Verizons
anti-spam filtering led to a court case as it also blocked legitimate messages
causing inconvenience for users who did not receive their legitimate e-mail.38
The Internet access architecture consists of three tiers. ISPs that connect
end users constitute Tier 3. Tiers 1 and 2 consist of the Internet bandwidth
providers (IBPs). Tier 1 carriers are the major IBPs. They usually have
peering39 arrangements with other Tier 1 IBPs. The main difference
between Tier 1 and Tier 2 IBPs is that Tier 1 IBPs exchange traffic through
peering, while Tier 2 IBPs have to pay transit fees to Tier 1 providers.40
Tier 1 is usually run by large companies, such as AT&T, Verizon, Level 3
Communications, Sprint, and NTT Communications.
The issues
50
The infrastructure and standardisation basket
Is it possible for the global Internet community to request assurances and guarantees
for the reliable functioning of the critical Internet infrastructure from major Internet
companies and telecommunication operators? The trend in discussion is on imposing
certain public requirements on private Internet infrastructure operators.
Network neutrality
The Internets success lies in its design, which is based on the principle
of network neutrality. From the outset, the flow of all the content on the
Internet, whether coming from start-ups or big companies, was treated
without discrimination. New companies and innovators did not need
permission or market power to innovate on the Internet.
51
Internet Governance
The importance of network neutrality to the success of the Internet is key. The
debate has attracted a wide range of actors: everyone from the President of the
United States to human rights grassroots activists. The way in which network
neutrality is treated can influence the future development of the Internet.
52
The infrastructure and standardisation basket
The issues
In the network neutrality debate, there is an emerging consensus that there
is a need for appropriate traffic management. The main question is how to
interpret the adjective appropriate. There are two areas besides technical
concerns economic and human rights where the debate on traffic
management and network neutrality is particularly heated.
Economic issues
During the past few decades, many significant network operators including
both telecoms and ISPs have changed their business models: besides
providing Internet access to households and businesses, they have introduced
their own VoIP (telephony via Internet) or IPTV (television via Internet)
services, video on demand (akin to renting movies), music or video download
portals, etc. They are now competing not only with their counterparts for
providing cheaper, faster, and better quality connections, but also with the
over-the-top (OTT) service providers content and service providers like
Google, Facebook, Netflix, and Skype.
At the same time, operators argue that the expansion of bandwidth demand
begs for increased investments in basic infrastructure. Seeing OTT service
providers as the ones contributing the most to the expanded demand and
benefiting the most from the improved infrastructure, they are suggesting
multi-tiered network policy models that would request the OTT service
providers to pay for the outreach to operators customers (Internet end-users)
if they wish a guaranteed quality of service. In such cases, traffic management
would again be used for economic rather than technical reasons. In order to
search for a way to the increased income, the telecoms designed a new type
of offers. Zero rating tariffs offered to customers by mobile telecom providers
allow unlimited (free) use of specific applications like Facebook or Wikipedia;
while this is certainly financially beneficial for customers, it prioritises certain
services over the other. Besides, telecoms refer to specialised services such
as HD video streaming offers that require high bandwidths, or future e-health
solutions that may need to be offered in future and would require high
quality and therefore special treatments.
53
Internet Governance
In the meantime, the market has brought changes in the way the Internet
works: in order to reduce transit costs and time, content providers have come
closer to users by setting up Content Delivery Networks (CDNs) caching
servers placed close to regional IXP hubs or within big regional telecoms. This
has improved network performance and costs yet only for OTT companies
that can afford to build or rent CDNs and pay the telecoms companies for
placement.46
Multi-tier Internet
The Internet traffic is currently delivered with best effort: it implies no guarantees
of a QoS, effective speed, or delivery time of data packages. Instead, users share the
available bandwidth and obtain variable bit rates (speed) depending on the traffic load
at the time.47 Traffic management therefore plays an important role in the effective
quality of service for end-users.
The multi-tier Internet concept refers to introducing a the business tier to the
Internet, i.e., special services with a guaranteed QoS beyond best effort. Proponents
explain that the business tier would run in parallel with the economic tier (the
Internet as we know it now) which would remain based on best effort; besides, they
say the OTT service providers could still decide to run their services through the best
effort network without cost, if they wished to do so.
54
The infrastructure and standardisation basket
Users or customers?
Who are the main players and what are their arguments?
The position of the main players is in a state of constant flux. For example, the
Google-Verizon 2010 proposal for a mid-way approach to network neutrality
shook the positioning of the main players.48 Google has been considered
one of the main proponents of network neutrality; others include consumer
advocates, online companies, some technology companies, many major
Internet application companies including Yahoo!, Vonage, Ebay, Amazon,
EarthLink, and software companies like Microsoft.
There are four main arguments in the network neutrality debate (Table 1).
55
Internet Governance
Table 1
Argument Proponents of network Opponents of network
neutrality neutrality
New Internet companies developed Traffic management is inevitable,
thanks to the Internets open and neutrality has never existed.
architecture, and end-users are Besides, there are already non-
benefiting from innovation and neutral leased services like VPNs
Past/future diversity of services thanks to net (virtual private networks).
argument neutrality. Network neutrality will Without network neutrality
preserve the Internet architecture restrictions Internet companies
that has enabled the fast and can develop new services in which
innovative development of the customers will be interested, with
Internet so far. guaranteed QoS.
56
The infrastructure and standardisation basket
57
Internet Governance
Policy approaches
With the network neutrality debate, another question has come to the fore:
what is the role of the legislators and regulators in broadband policy and
operator practices? One of the major challenges regulators face is whether
to act preemptively (ex-ante), in order to prevent possible breaches of the
network neutrality principle, or to respond based on precedents (ex-post) once
(and if ) the breach occurs. A challenge that legislators and policymakers face
is whether the problem should be dealt with, with hard law encoding the
principles into legislation or if soft law (guidelines and policies) would be
sufficient.51
Developed countries
In response to the Comcast case, the US Federal Communications
Commission (FCC) adopted the guidelines on network neutrality as an
update to its 2005 policy paper,52 which reflected the need for access to and
choice of content and devices, and addressed the issues of discrimination
and transparency. In the meantime, the FCCs decisions in support of net
neutrality were overruled in early 2014 by the US appeals court on the basis
of the FCCs limited mandate. It forced the FCC to consider allowing
telecom providers some form of pay for preference regimes or reclassify
broadband as a public utility, thereby obtaining a mandate to enforce net
neutrality. The EU regulatory framework on electronic communications
targets protecting freedom of expression, users choice, and access rights, along
with the transparency principle; yet it also stresses the need for investment,
fair competition with no discrimination, and opportunities for new business
models including innovative business.53 In 2014, the European Parliament
adopted the Regulation on the Single Telecoms Market, with strong net
neutrality provisions (including a rigorous definition and solid framework for
specialised services).54 Brazil,55 Chile,56 Slovenia, and the Netherlands protect
net neutrality by national legislation.
Developing countries
Due to limited infrastructure and bandwidth, regulators of developing
countries put more focus on fair usage policy affordable prices and fair
access for all. Some raise concerns over cross-border non-discrimination,
saying that the traffic from all countries should be treated the same way
with no preferences based on termination costs. Also, certain countries have
more sensitivity to internal cultural, political, or ethical aspects, thereby
understanding (in)appropriate use and management differently than others.
Concerns have been raised that the innovative models of the developed
world might hamper developing markets: by prioritising the services of
big Internet companies, emerging business and competition would be
additionally downsized, threatening innovation, local content and services,
58
The infrastructure and standardisation basket
Open issues
There are a number of open issues on the network neutrality debate agenda:
P Where should the balance be between public good effects of the Internet
and user (and human) rights on the one hand, and the rights of the
providers to innovate within the networks they own on the other?
P Would an unregulated market with open competition, as advocated by the
carriers, provide unlimited (or sufficient) choice for users? And would the
users be able to make meaningful decisions?60 Or should the regulators
inevitably be empowered as safeguards, and if so, with what authority?
P How would different legal and regulatory approaches impact the
broadband market and further investment and innovation?
59
Internet Governance
Web standards
By the late 1980s, the battle of network standards was over. TCP/IP gradually
became the main network protocol, marginalising other standards, such
as the ITU-supported X-25 (part of the Open Systems Interconnection
architecture) and many proprietary standards, such as IBMs SNA. While the
Internet facilitated normal communication between a variety of networks via
TCP/IP, the system still lacked common applications standards.
60
The infrastructure and standardisation basket
Since its first version, HTML has been constantly upgraded with new
features. The growing relevance of the Internet has put the question of the
standardisation of HTML into focus. This was particularly relevant during
the Browser Wars between Netscape and Microsoft, when each company tried
to strengthen its market position by influencing HTML standards. While
basic HTML only handled text and photos, newer Internet applications
required more sophisticated technologies for managing databases, video, and
animation. Such a variety of applications required considerable standardisation
efforts in order to ensure that Internet content could be properly viewed by
the majority of Internet browsers.
Cloud computing
Cloud computing could be described as the shift of data from hard disks
on our computers to servers in the clouds (i.e., huge server farms). The first
wave of cloud computing started with the use of online mail servers (Gmail,
Yahoo!), social media applications (Facebook, Twitter) and online applications
(Wikis, blogs, Google docs). Apart from everyday applications, cloud
computing is extensively used for business software. More and more of our
digital assets are moving from our hard disks to the cloud. The main players in
cloud computing are Google, Microsoft, Apple, Amazon, and Facebook, who
either already have or plan to develop big server farms.
61
Internet Governance
62
The infrastructure and standardisation basket
Figure 9
63
Internet Governance
The issues
64
The infrastructure and standardisation basket
Some countries, like Malaysia and Switzerland, as well as the EU, have started
providing answers to these questions. Malaysia adopted the Communications
and Multimedia Act in 1998, establishing a general framework for the
regulation of convergence. The EUs regulatory framework for electronic
communications, transposed into national laws, is also a step in this direction,
as are the Swiss telecommunication laws and regulations.
Some parties argue that the cable operators buffering between users and the
Internet could challenge the net neutrality principle.
The main difference between ADSL and cable is that cable is not regulated
by so-called common carrier rules which apply to the telephony system and
specify that access should be non-discriminatory. Cable operators are not
subject to these rules, giving them complete control over their subscribers
Internet access. They can block the use of certain applications and control
the access to certain materials. Surveillance possibilities and consequently the
ability to violate privacy are much greater with the cable Internet since access
is controlled through a system similar to local area networks (LANs), which
provides a high level of direct control of users.
In a paper on this issue, the American Civil Liberties Union provides the
following example of the risks of cable Internet monopolies: This is like the
phone company being allowed to own restaurants and then provide good
service and clear signals to customers who call Dominos and frequent busy
signals, disconnects and static for those calling Pizza Hut.62
65
Internet Governance
Cybersecurity
Cybersecurity came into sharper focus with the Internet expansion beyond
the circle of the Internet pioneers. The Internet reiterated the old truism that
technology can be both enabling and threatening. What can be used to the
advantage of society can also be used to its disadvantage.
66
The infrastructure and standardisation basket
At international level, the ITU is the most active organisation; it has produced
a large number of security frameworks, architectures, and standards, including
X.509, which provides the basis for the public key infrastructure (PKI), used,
for example, in the secure version of HTTP(S) (HyperText Transfer Protocol
(Secure)). The ITU moved beyond strictly technical aspects and launched the
Global Cybersecurity Agenda.63 This initiative encompasses legal measures,
policy cooperation, and capacity building. Furthermore, at WCIT-12, new
articles on security and robustness of networks and on unsolicited bulk
electronic communications (usually referred to as spam) were added to the
ITRs.64
The Commonwealth Cybercrime Initiative (CCI) was given its mandate from
Heads of government of the Commonwealth in 2011 to improve legislation
and the capacity of member states to tackle cyber crime.65 Dozens of partners
involved with CCI assist interested countries with providing scoping missions,
67
Internet Governance
68
The infrastructure and standardisation basket
The issues
Figure 10
69
Internet Governance
Figure 11
70
The infrastructure and standardisation basket
Individual Internet users are the pillars of cybersecurity. Yet they are often the
weakest link when it comes to protection from cyber-attacks. Our personal
computers are used to stage cyber-attacks (as part of botnets) and spread
viruses and malware. Unprotected access to our computers and mobile devices
offers a backdoor for access to the datasets of our companies or institutions,
and compromises many more computers.
Concerns of the end users, however, are usually not about possible greater
damage (often due to ignorance) as a result of their compromised computer,
71
Internet Governance
but rather about the protection of their own data, and thus integrity and
privacy and rights in general. Post-PRISM discussions emphasise making
personal computers more surveillance-safe, including how to employ
encryption, regular patches and updates, IPSec and VPN protocols77
awareness measures that would, in fact, also prevent unprotected access and
contribute to better general cybersecurity.
The main challenge will be to overcome the post-9/11 dominant view of win/
lose: more security implies fewer human rights and vice versa. Yet there are
many win/win areas in empowering and protecting individuals as pillars of the
cybersecurity system (access to information, privacy protection), which should
be given priority.
Encryption
For example, the US policy of export control of encryption software was not
very successful because it could not control international distribution. US
72
The infrastructure and standardisation basket
73
Internet Governance
Spam
On the legal side, many states have reacted by introducing new anti-spam
laws. In the USA, the Can-Spam Law involves a delicate balance between
allowing e-mail-based promotion and preventing spam.82 Although the law
prescribes severe penalties for distributing spam, including prison terms of
up to five years, some of its provisions, according to critics, tolerate or might
even encourage spam activity. The starting, default, position set out in the law
is that spam is allowed until the receiver of spam messages says stop (by using
an opt-out clause).
In July 2003, the EU introduced its own anti-spam law as part of its directive
on privacy and electronic communications. The EU law encourages self-
regulation and private sector initiatives that would lead towards a reduction in
spam.83
74
The infrastructure and standardisation basket
Spam is an illustrative example of the trends and, sometimes, fashion in global policy.
In 2005, spam was an important Internet governance issue, listed as a significant
Internet governance issue in the WGIG report. Spam was discussed at WSIS Tunis and
at numerous international meetings. Spam was also frequently covered in the media.
Since 2005, the volume of spam has tripled, according to conservative estimates
(2005: 30 billion messages per day; 2008: 100 billion messages per day; 2010: 200
billion messages per day). The policy relevance of spam does not follow this trend.
Spam now has a very low visibility in global policy processes.
An MoU signed by Australia, Korea, and the UK is one of the first examples
of international cooperation in the anti-spam campaign.
75
Internet Governance
The issues
76
The infrastructure and standardisation basket
Endnotes
1
The terms Internet and www are sometimes used interchangeably; however, there is a
difference. The Internet is a network of networks connected by TCP/IP. Sometimes, the
term Internet is used to encompass everything, including infrastructure, applications
(e-mail, ftp, Web) and content. The www is just one of many Internet applications, a system
of interlinked documents connected with the help of the HyperText Transfer Protocol
(HTTP).
2
Following a policy of technological neutrality, the European Union has been using the
term electronic communications instead of telecommunications. This covers, for example,
Internet traffic over the electronic grid, which is not part of the telecommunications
infrastructure.
3
Internet transfer via an electric grid is called Power Line Communication (PLC). The use
of the power grid would make the Internet more accessible to many users. For a technical
and organisational review of this facility, please consult: Palet J (2003) Addressing the Digital
Divide with IPv6-enabled Broadband Power Line Communication, Internet Society, ISOC
Member Briefing No. 13. Available at http://www.isoc.org/briefings/013 [accessed 13
February 2014].
4
The liberalisation of telecommunication markets of WTO members was formalised in
1998 in the so-called Basic Telecommunication Agreement (BTA). Following the adoption
of BTA, more than 100 countries began the liberalisation process, characterised by the
privatisation of national telecommunication monopolies, the introduction of competition,
and the establishment of national regulators. The agreement is formally called The Fourth
Protocol to the General Agreement on Trade in Services (adopted on 30 April 1996 and
entering into force on 5 February 1998). Available at http://www.wto.org/english/
tratop_e/serv_e/4prote_e.htm [accessed 13 February 2014].
5
ITU (no date) Signatories of the Final Acts WCIT-12. Available at http://www.itu.int/
osg/wcit-12/highlights/signatories.html [accessed 11 August 2014].
6
One of the controversies surrounding WSIS was the ITUs intention to become more
involved in the Internet governance process, especially within a domain handled by
ICANN. For more information about ITUs Internet policy, please consult http://www.itu.
int/osg/csd/intgov/ [accessed 13 February 2014].
7
For more information about the WTOs role in the field of telecommunications, consult
http://www.wto.org/english/tratop_e/serv_e/telecom_e/telecom_e.htm [accessed 13
February 2014].
8
Latvia and Moldova are good examples of how it is possible to make a quantum leap
forward in the quick development of a telecommunications infrastructure through the
introduction of wireless communication; check http://www.isoc.org/isoc/conferences/
inet/99/proceedings/4d/4d_2.htm [accessed 13 February 2014].
9
Nothias J-C (2012) The hypocrisy threatening the future of the Internet. The Global Journal.
Available at http://theglobaljournal.net/article/view/904/ [accessed 10 August 2014].
77
Internet Governance
10
Initially the Wi-Fi Alliance was called the Wireless Ethernet Compatibility Alliance
(WECA). It received its current name in 2002. It was established by some of the leading
developers of telecom equipment including: 3Com, Cisco, Intersil, Agere, and Nokia.
11
It is estimated that this investment totals approximately 109 billion, according to
The Economist (2003) Beyond the Bubble Survey: Telecoms. Available at http://www.
economist.com/node/2098913 [accessed 13 February 2014].
12
For more information about the EU radio spectrum policy see http://ec.europa.eu/
digital-agenda/en/what-radio-spectrum-policy [accessed 13 February 2014].
13
The current RIRs are: ARIN (the American Registry for Internet Numbers), APNIC (the
Asia Pacific Network Information Centre), LACNIC (the Latin American and Caribbean
IP Address Regional Registry), RIPE NCC (Reseaux IP Europens Network Coordination
Centre covering Europe and the Middle East) and AFRINIC (the African Network
Information Centre). A detailed explanation of the RIR system is available at http://www.
ripe.net/internet-coordination/internet-governance/internet-technical-community/
the-rir-system [accessed 13 February 2014].
14
For a detailed discussion on IPv6, please consult the research project: IP Allocation and
IPv6 by Jean Philmon Kissangou, Marsha Guthrie, and Mwende Njiraini, part of the
2005 Internet Governance Capacity Building Programme. Available at http://archive1.
diplomacy.edu/poolbin.asp?IDPool=130 [accessed 13 February 2014].
15
For a comprehensive and highly technical survey of TCP/IP Security, please consult:
Chambers C, Dolske J and Iyer J., TCP/IP Security, Department of Computer and
Information Science, Ohio State University. Available at http://www.linuxsecurity.com/
resource_files/documentation/tcpip-security.html [accessed13 February 2014].
16
One of the few referential documents on the domain name system (DNS) is RFC 1591
(March 1994), which specifies the governance structure of DNS. Available at http://www.
ietf.org/rfc/rfc1591.txt [accessed 13 February 2014].
17
An overview of the gTLDs with a link to the list of all the TLDs is available at http://
www.icann.org/en/resources/registries/about [accessed 13 February 2014].
18
The text of proposal is available at http://archive.icann.org/en/tlds/stld-apps-19mar04/
xxx.htm; the retrospective of the .XXX application, within the minutes of the meeting of 30
March 2007 when it was rejected by the ICANN Board, is available at http://www.icann.
org/en/groups/board/documents/resolutions-30mar07-en.htm#_blank [accessed 13
February 2014].
19
The US government did not use an ICANN procedure. It used its de facto authority via a
letter sent by the US Department of Commerce to the Chairman of ICANN.
20
The application form for the registration of the .cat domain: http://archive.icann.org/en/
tlds/stld-apps-19mar04/cat.htm [accessed 13 February 2014].
21
Summary report ICANN 50. Geneva Internet Platform. Available at http://www.
giplatform.org/resources/gip-summary-report-icann-50 [accessed 9 August 2014].
22
The ITUs website contains a comprehensive bibliography of materials related to Country
Domain Management; most materials were delivered at the ITU Workshop on Country
Domain Management held in Kuala Lumpur. Available at http://www.itu.int/ITU-T/
worksem/cctld/kualalumpur0704/contributions/index.html [accessed 13 February 2014].
78
The infrastructure and standardisation basket
23
The IANA Report on the county code top-level domain for Palestine is available at http://
www.iana.org/reports/ps-report-22mar00.htm [accessed 13 February 2014].
24
For example, South Africa used its sovereign rights as an argument in winning back control
of its country domain. A newly enacted law specifies that the use of the country domain
outside the parameters prescribed by the South African government will be considered
a crime. The Brazilian model of the management of country domains is usually quoted
as a successful example of a multistakeholder approach. The national body in charge
of Brazilian domains is open to all key players, including government authorities, the
business sector, and civil society. Cambodias transfer of country domain management from
nongovernmental to governmental control is often cited as an example of an unsuccessful
transition. The government reduced the quality of services and introduced higher fees,
which have made the registration of Cambodian domains much more difficult. For more
information, please consult: Alfonso C (2004) BR: CCTLD An asset of the commons, in
MacLean D (ed) Internet Governance: A Grand Collaboration. New York: UN ICT Task
Force, pp. 291-299; Klien N (2004) Internet Governance: Perspectives from Cambodia in
MacLean D (ed) Internet Governance: A Grand Collaboration. New York: UN ICT Task
Force, pp. 227-237. Excerpts available at http://books.google.ro/books?id=pEFAypES4t0
C&printsec=frontcover&hl=ro#v=onepage&q&f=false [accessed 13 February 2014].
25
ICANN (2005) Principles for the Delegation and Administration of Country Code
Top-Level Domains. Available at http://archive.icann.org/en/committees/gac/gac-
cctldprinciples-23feb00.htm [accessed 13 February 2014].
26
The list of root zone servers, their nodes and positions, and managing organisations is
available at http://www.root-servers.org/ [accessed 13 February 2014].
27
ISC Inc. (2003) Hierarchical Anycast for Global Distribution. Available at http://ftp.isc.
org/isc/pubs/tn/isc-tn-2003-1.html [accessed 13 February 2014].
28
IANA root servers. Available at http://www.iana.org/domains/root/servers [accessed 9
August 2014].
29
The root zone file is publicly available at http://www.iana.org/domains/root/files
[accessed 9 August 2014].
30
NTIA (2014) NTIA announces intent to transition key Internet domain names functions.
Available at http://www.ntia.doc.gov/press-release/2014/ntia-announces-intent-
transition-key-internet-domain-name-functions[accessed 9 August 2014].
31
US officials counter that the Internet is too valuable to tinker with or place under an
international body like the UN: Whats at risk is the bureaucratisation of the Internet
and innovation, said Michael Gallagher, the Department of Commerce official who
administered the governments tie to ICANN. Mr Gallagher and other backers of ICANN
also pointed out that the countries loudest in demanding more international input
China, Libya, Syria, Cuba have non-democratic governments. Allowing these nations to
influence how the Internet works could hinder the freedom of speech, they said. (Source:
Rhoads C (2006) Endangered Domain: In Threat to Internets Clout, Some Are Starting
Alternatives. The Wall Street Journal, 19 January 2006; p. A1).
32
Bertola V (no date) Oversight and multiple root server systems. Available at http://wgig.
org/docs/book/Vittorio_Bertola.html [accessed 13 February 2014].
79
Internet Governance
33
The Court of Appeal of The Hague ruled against the Church of Scientology in its
copyright infringement suit against a Dutch writer and her ISP, XS4ALL. The writer,
formerly a practicing Scientologist, posted to a website parts of confidential church
documents, and the church sued under the Dutch Copyright Act of 1912. In 1999, the
District Court ruled in favour of the defendants, citing freedom of speech concerns.
However, that court also ruled that ISPs should be held liable for posted materials that
might violate existing copyrights. The Court of Appeal affirmed the first ruling, but reversed
the second, holding that ISPs were not liable for posted materials. For more information
consult Gelman L (2003) Church of Scientology Loses Copyright Infringement Case in
Dutch Court. Available at http://cyberlaw.stanford.edu/packets001638.shtml [accessed
13 February 2014].
34
For more information on this case see Electronic Privacy Information Center (2004) RIAA
vs Verizon. Available at http://epic.org/privacy/copyright/verizon/ [accessed 13 February
2014].
35
The Supreme Court of Canada rejected the argument of the Society of Composers, Authors
and Music Publishers of Canada that Canadian ISPs should pay royalties because some
of their customers download copyrighted works (SOCAN vs CAIP). More information
available at http://www.canlii.org/en/ca/scc/doc/2004/2004scc45/2004scc45.html
[accessed 13 February 2014].
36
SABAM (the Belgian collective society Socit belge des auteurs, compositeurs et diteurs)
wanted the ISP Scarlet to install a generalised filtering system for all incoming and
outgoing electronic communications passing through its services and to block potentially
unlawful communications. In First Instance, while refusing the liability of the ISP, the
Brussels Court concluded that the SABAMs claim was legitimate and that a filtering
system had to be deployed. Scarlet appealed and the case was referred to the Court of
Justice of the European Union. In its decision, the Court of Justice ruled that a filtering and
blocking system for all its customers for an unlimited period, in abstracto and as preventive
measure, violates fundamental rights, more particularly the right to privacy, freedom of
communication and freedom of information. In addition, it breaches the freedom of ISPs to
conduct business. For more information, see Scarlet v SABAM: a win for fundamental rights
and Internet freedoms EDRi-gram newsletter No. 9.23, 30 November 2011. Available at
http://edri.org/edrigramnumber9-23scarlet-sabam-win-fundamental-rights [accessed
15 March 2014].
37
Williams F (2006) ISPs should be liable for spam, says UN report, Financial
Times. Available at http://www.ft.com/intl/cms/s/09b837c0-ae02-11da-8ffb-
0000779e2340,Authorised=false.html?_i_location=http%3A%2F%2Fwww.
ft.com%2Fcms%2Fs%2F0%2F09b837c0-ae02-11da-8ffb-0000779e2340.html%3Fsite
edition%3Dintl&siteedition=intl&_i_referer=#axzz1l2VhnlN0 [accessed 13 February
2014].
38
Shannon V (2006) The end user: Junk payout in spam case Technology International
Herald Tribune. Available at http://www.nytimes.com/2006/04/12/technology/12iht-
PTEND13.1523942.html [accessed 13 February 2014].
39
In computer networking, peering is a voluntary interconnection of administratively separate
Internet networks for the purpose of exchanging traffic between the customers of each
network. The pure definition of peering is settlement-free or sender keeps all, meaning that
neither party pays the other for the exchanged traffic; instead, each derives revenue from its
own customers. Peering requires physical interconnection of the networks, an exchange of
80
The infrastructure and standardisation basket
routing information through the Border Gateway Protocol (BGP) routing protocol and is
often accompanied by peering agreements of varying formality, from handshake to thick
contracts. (Source: Wikipedia).
40
Tier 2 Internet Bandwidth Providers are usually called ICP (Internet connection points) or
Internet gateways.
41
Two related cases were mentioned in Spaink K (2002) Freedom of the Internet, our new
challenge. Available at http://www.spaink.net/english/osce_internetfreedom.html
[accessed 13 February 2014]. In the first case, legal action was launched against a web
page with questionable Nazi content hosted by Flashback in Sweden. The courts decided
that the page did not violate Swedish anti-Nazi laws. Nevertheless, one committed anti-
Nazi activist mounted a strong campaign against Flashback, thereby putting pressure
on Flashbacks ISP, Air2Net, and the main backbone operator MCI/WorldCom. Under
pressure from this campaign, MCI/WorldCom decided to disconnect Flashback in spite
of a lack of any legal basis for doing so. Flashbacks attempts to find an alternative provider
were unsuccessful, since most of them were also connected through the backbone operated
by MCI/WorldCom. The second case took place in the Netherlands. A small Dutch ISP
provider, Xtended Internet, was disconnected by its US-based upstream provider under
pressure from the Scientology lobby.
42
Signal transmission technologies both for wireless (like LTE) and optical cables (like
DWDM) promise to solve the bandwidth exhaustion problem with much greater
bandwidth specifications (up to terabits per second). The demand-supply run, however, is
perpetual.
43
Cisco (no date) The Internet of Things. Available at http://www.cisco.com/web/solutions/
trends/iot/overview.html [accessed 10 August 2014].
44
The Economist (2009) America insists on net neutrality: The rights of bits. 24 September.
Available at http://www.economist.com/node/14517422 [accessed 13 February 2014].
45
Full text of a Verizon and Google Legislative Framework Proposal for an Open Internet
is available at http://www.google.com/googleblogs/pdfs/verizon_google_legislative_
framework_proposal_081010.pdf [accessed 13 February 2014].
46
McMillan R (2014) What everyone gets wrong in the debate over net neutrality. Available
at http://www.wired.com/2014/06/net_neutrality_missing/ [accessed 10 August 2014].
47
The bandwidth (bit rate) agreed to in a contract with the ISP is, in fact, only the maximum
available rather than a guaranteed effective speed.
48
Ogg E (2010) Report: Google, Verizon reach Net neutrality deal. Available at http://news.
cnet.com/8301-31021_3-20012703-260.html?tag=mncol;mlt_related [accessed 13
February 2014].
49
McCullagh D (2012) European ISPs defend U.N. Internet tax. Available at http://news.
cnet.com/8301-13578_3-57496581-38/european-isps-defend-u.n-internet-tax/
[accessed 13 February 2014].
50
Those elements that are still controversial and to be negotiated about in future are in square
brackets.
81
Internet Governance
51
Radunovic V (2012) Network Neutrality in law a step forwards or a step backwards?
Diplo Blog. Available at http://www.diplomacy.edu/blog/network-neutrality-law-
%E2%80%93-step-forwards-or-step-backwards [accessed 13 February 2014].
52
FCC (2005) Policy statement. Available at http://hraunfoss.fcc.gov/edocs_public/
attachmatch/FCC-05-151A1.pdf [accessed 13 February 2014].
53
Kroes N (2010) Net neutrality in Europe. Speech given by Vice President of the European
Commission Commissioner for the Digital Agenda. Available at http://europa.eu/rapid/
press-release_SPEECH-10-153_en.htm?locale=en [accessed 13 February 2014].
54
La Quadrature du Net (2014) Net neutrality: a great step forward for the free Internet.
Available at http://www.laquadrature.net/en/net-neutrality-a-great-step-forward-for-
the-free-internet [accessed 11 August 2014].
55
English version of the Brazilian Marco Civil is available at http://giplatform.org/
resources/text-brazils-new-marco-civil [accessed 10 August 2014].
56
TechnoLlama (2012) Chile enforces net neutrality for the first time, sort of. Available at
http://www.technollama.co.uk/chile-enforces-net-neutrality-for-the-first-time-sort-
of [accessed 13 February 2014].
57
Integral text of the 2010 Declaration of the Committee of Ministers on network neutrality
of Council of Europe is available at https://wcd.coe.int/ViewDoc.jsp?id=1678287
[accessed 13 February 2014].
58
ISOC considers the concept of network neutrality as rather ill-defined, and instead
discusses the continued open inter-networking. Available at http://www.internetsociety.
org/articles/internet-society-publishes-statement-open-inter-networking [accessed
13 February 2014]. Its 16 May 2010 Public consultation on Net Neutrality states: Rather
than focusing simply on the range of possible Network Neutrality definitions, the Internet Society
believes it is more appropriate to concentrate more broadly on the imperative of preserving the
open, user-centric Internet model that has been so successful to date.
59
TACD (no date) TACD calls for Net Neutrality. Available at http://tacd.
org/?option=com_content&task=view&id=162&Itemid=43 [accessed 13 February
2014].
60
Radunovic V (2012) Can free choice hurt open Internet markets? Diplo Blog. Available
at http://www.diplomacy.edu/blog/can-free-choice-hurt-open-internet-markets
[accessed 13 February 2014].
61
Chetan Sharma lists some interesting opportunities for cooperation between OTT and
mobile operators, like analysing real-time network conditions, sharing user behaviour info,
location and presence (within limits of privacy regulations), or third-party services billing
through mobile subscription. Available at http://synergy.syniverse.com/2012/05/mobile-
operators-and-otts-building-a-win-win-partnership/ [accessed 13 February 2014].
62
ACLU White Paper (2005) No competition: How monopoly control of the broadband
Internet threatens free speech. ACLU: New York, NY, USA. Available at https://www.
aclu.org/technology-and-liberty/monopoly-control-broadband-internet-threatens-
free-speech [accessed 13 February 2014].
82
The infrastructure and standardisation basket
63
Global Cybersecurity Agenda (no date). Available at http://www.itu.int/osg/csd/
cybersecurity/gca/ [accessed 13 February 2014].
64
ITU (2012) WCIT-12 Final Acts. Available at http://www.itu.int/en/wcit-12/
Documents/final-acts-wcit-12.pdf [accessed 10 August 2014].
65
CCI (no date) Commonwealth Cybercrime Initiative. Available at http://www.
commonwealthcybercrimeinitiative.org/ [accessed 11 August 2014].
66
Council of Europe (2001) Convention on Cybercrime. Available at http://conventions.
coe.int/Treaty/en/Treaties/Html/185.htm [accessed 13 February 2014].
67
UN report A/65/201 Group of Governmental Experts on Developments in the Field of
Information and Telecommunications in the Context of International Security. Available
at http://www.unidir.org/files/medias/pdfs/final-report-eng-0-189.pdf [accessed 10
August 2014].
68
CCDCOE (2013) The Tallinn Manual. Available at http://www.ccdcoe.org/tallinn-
manual.html [accessed 10 August 2014].
69
Sofaer AD et al. (2000) Proposal for an international convention on cybercrime. Available
at http://www.iwar.org.uk/law/resources/cybercrime/stanford/cisac-draft.htm
[accessed 13 February 2014].
70
DNSSEC explained. Available at http://everything.explained.at/DNSSEC/ [accessed 13
February 2014].
71
For an overview of current status and challenges in DNSSEC deployment see Marsan C
(2012) Will 2012 be the dawn of DNSSEC? 18 January 2012 Networkworld. Available
at http://www.networkworld.com/news/2012/011812-dnssec-outlook-255033.html
[accessed 13 February 2014].
72
Radunovic V (2013) Waging a (private) cyber war. Available at http://www.diplomacy.
edu/blog/waging-private-cyberwar [accessed 10 August 2014].
73
Perlroth N and Gellese D (2014) Russian gang said to amass more than a billion stolen
Internet credentials. New York Times. Available at http://www.nytimes.com/2014/08/06/
technology/russian-gang-said-to-amass-more-than-a-billion-stolen-internet-
credentials.html?_r=0 [accessed 10 August 2014].
74
Brazil and the EU have pushed forward their dialogue on developing a direct submarine
link. Available at http://rt.com/news/brazil-eu-cable-spying-504/ [accessed 10 August
2014].
75
Keck Z (2014) China expands cyber spying. Available at http://thediplomat.
com/2014/04/china-expands-cyber-spying/ [accessed 10 August 2014].
76
Ranger S (2014) Were the real hacking victims, says China. Available at http://www.
zdnet.com/were-the-real-hacking-victims-says-china-7000029666/ [accessed 10
August 2014].
77
Schneier B (2013) NSA surveillance: A guide to staying secure. Available at www.
theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance [accessed
12 August 2014].
83
Internet Governance
78
EU Commission (2013) Cybersecurity Strategy of the European Union: An Open, Safe
and Secure Cyberspace. Available at http://ec.europa.eu/digital-agenda/en/news/
eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-
cyber-security [accessed 12 August 2014].
79
The Wassenaar Arrangement. Available at http://www.wassenaar.org/ [accessed 13
February 2014].
80
The Clipper approach was proposed by the US government back in 1993. At its core
was the use of a Clipper chip which was supposed to be used in all telephones and other
voice communication tools. The Clipper chip had a back door which could be used by
governments for lawful surveillance. After strong opposition from human rights activists
and the general public, the US government dropped this proposal in 1995. See: Denning D
(1995) The case for clipper. MIT Technology Review. MIT: Cambridge, MA, USA. Available
at http://encryption_policies.tripod.com/us/denning_0795_clipper.htm [accessed 13
February 2014].
81
Spam stops here (2014) Global Spam Threat Report. Available at http://www.
spamstopshere.com/global-report/spam-threats-february-2014.php [accessed 11
August 2014].
82
More references to Can-Spam are available at the Bureau of Consumer Protection (2009).
The CAN-SPAM Act: A Compliance Guide for Business. Available at http://www.business.ftc.
gov/documents/bus61-can-spam-act-compliance-guide-business [accessed 13 February
2014].
83
The Contact Network of Spam Enforcement Authorities (CNSA) was established in
February 2005 by 13 EU countries (France, Austria, Belgium, Cyprus, the Czech Republic,
Denmark, Greece, Ireland, Italy, Lithuania, Malta, the United Kingdom, and Spain). It aims
to promote both cooperation among these states and coordination with entities outside the
EU, such as the OECD and the ITU.
84
As quoted in Johnsson O (2007) Methods to combat SPAM. Available at http://home.
swipnet.se/Johnson_Consulting/images/spam1.htm [accessed 13 February 2014].
85
BBC NEWS (2004) European anti-spam laws lack bite. 28 April. Available at http://news.
bbc.co.uk/2/hi/technology/3666585.stm [accessed 13 February 2014].
86
For more information about ITU activities related to combating spam see ITU (no date)
ITU Activities on Countering Spam. Available at http://www.itu.int/osg/spu/spam/
[accessed 13 February 2014].
84
Section 3
86
The legal basket
A
lmost every aspect of Internet governance includes a legal component,
yet the shaping of a legal framework to mould the rapid development
of the Internet is in its early phase. The two prevalent approaches are:
Legal instruments
A wide variety of legal instruments exist that have either already been applied
or could be applied to Internet governance.
87
Internet Governance
Note
A frequent argument for a new regulation for cyberspace is that traditional regulation
(e.g. crime, taxation) is not efficient enough. It is important to keep in mind that laws
do not make prohibited behaviour impossible, only punishable.
Legislation
Legislative activities have progressively intensified in the field of the Internet.
This is especially the case within EU and OECD countries, where the
Internet is widely used and has a high degree of impact on economic and
social relations. To date, the priority areas for Internet legislation have been
privacy, data protection, intellectual property, taxation, and cybercrime.
Self-regulation
The US governments 1998 White Paper on Internet Governance2 that
paved the way for the foundation of ICANN, proposed self-regulation as the
preferred regulatory mechanism for the Internet. Self-regulation has elements
in common with previously described social norms. The main difference is
that unlike social norms, which typically involve tacit and diffused rules,
88
The legal basket
Jurisprudence
Jurisprudence (court decisions) is the cornerstone of the US legal system,
the first to address Internet legal issues. In this system, precedents create law,
especially in cases involving the regulation of new issues, such as the Internet.
Judges have to decide cases even if they do not have the necessary tools, i.e.,
legal rules.
The first legal tool judges use is legal analogy, where something new is related
to something familiar. Most legal cases concerning the Internet are solved
through analogies.
The difference between international private law and international public law
The cross-border nature of Internet activities implies the need for the use
of international legal tools. In discussions on international law there is a
terminological confusion that could have substantive consequences. The
term international law is mainly used as a synonym for international public
law, established by nation states, usually through the adoption of treaties and
conventions. International public law applies to many areas of the Internet
including telecommunications, human rights, and cybercrime to name a
few. However, international private law is equally, if not more important,
for dealing with Internet issues, since most Internet court cases involve
issues such as contracts, torts, and commercial responsibilities. The rules
of international private law specify the criteria for establishing applicable
jurisdiction and law in legal cases with foreign elements (e.g. legal relations
involving two or more entities from different countries). For example, who
89
Internet Governance
has jurisdiction in the potential legal cases between Internet companies (e.g.
Facebook, Twitter) and their users scattered all over the world. The jurisdiction
criteria include the link between an individual and national jurisdiction (e.g.
nationality, domicile) or the link between a particular transaction and national
jurisdiction (e.g. where the contract was concluded, where the exchange of
goods took place).
International conventions
The main set of conventions on Internet-related issues was adopted
by the ITU, with the ITRs being the most important for preparing a
telecommunication policy framework for subsequent Internet developments.
The current version of the ITRs (1998) was amended at WCIT-12. Apart
from the ITU conventions, the only convention that deals directly with
Internet-related issues is the CoEs Cybercrime Convention. However, many
other international legal instruments address broader aspects of Internet
governance, such as human rights, trade, and intellectual property rights.
90
The legal basket
Soft law
Soft law has become a frequently used term in the Internet governance
debate. Most definitions of soft law focus on what it is not: it is not a legally
binding instrument. Typically, soft law instruments contain principles and
norms rather than specific rules which are usually found in international
documents such as declarations and resolutions. Since it is not legally binding,
it cannot be enforced through international courts or other dispute resolution
mechanisms.
The main WSIS documents, including the Final Declaration, the Plan of
Action, and Regional Declarations, have the potential to develop certain soft
law norms. They are not legally binding, but they are usually the result of
prolonged negotiations and acceptance by nation states. The commitment that
nation states and other stakeholders put into negotiating soft law instruments
and reaching a necessary consensus creates the first element in considering
that such documents are more than simple political declarations.
Ius cogens
Ius cogens is described by the Vienna Convention on the Law of Treaties3 in
Article 53 as a norm, accepted and recognised by the international community
of States as a whole, from which no derogation is permitted and which can be
modified only by a subsequent norm of general international law having the
91
Internet Governance
same character. Professor Brownlie lists the following examples of ius cogens
rules:
P The prohibition of the use of force.
P The law of genocide.
P The principle of racial non-discrimination.
P Crimes against humanity.
P The rules prohibiting trade in slaves and piracy.4
In Internet governance, ius cogens could be used for activities that promote
some of these rules (e.g. genocide, racial discrimination, slavery).
Jurisdiction
92
The legal basket
P Effects Principle the right of the state to rule on economic and legal
effects on its territory, stemming from activities conducted abroad.
Another important principle introduced by modern international law is that
of universal jurisdiction.6 The concept of universal jurisdiction in its broad
sense [is] the power of a state to punish certain crimes, wherever and by
whomsoever they have been committed, without any required connection to
territory, nationality, or special state interest. 7 Universal jurisdiction covers
such crimes as piracy, war crimes, and genocide.
Conflict of jurisdiction
The conflict of jurisdiction arises when more than one state claims jurisdiction
on a particular legal case. It usually happens when a legal case involves an
extra-territorial component (e.g. involves individuals from different states, or
international transactions). The relevant jurisdiction is established by one of
the following elements: territoriality, nationality, or effect of action). When
placing content or interacting on the Internet, it is difficult to know which
national law, if any, might be violated. In this context, almost every Internet
activity has an international aspect that could lead to multiple jurisdictions or
a so-called spill-over effect.8
One of the early and frequently quoted cases that exemplify the problem of
multiple jurisdictions is the 2001 Yahoo! case in France.9 It was prompted by a
breach of French law, which prohibits the exhibition and sale of Nazi objects,
even though the website that provided these items the Yahoo.com auction
website was hosted in the USA, where the display of such materials was, and
still is, legal. The court case was solved through the use of a technical solution
(geo-location software and filtering of access). Yahoo! was forced to identify
users who accessed the site from France and block their access to the web
pages showcasing Nazi materials.10
93
Internet Governance
Arbitration
Arbitration is a dispute resolution mechanism available in place of traditional
courts. In arbitrations, decisions are made by one or more independent
individuals chosen by the disputants. International arbitration within the
business sector has a long-standing tradition. An arbitration mechanism is
usually set out in a private contract with parties agreeing to settle any future
disputes through arbitration. A wide variety of arbitration contracts are
available, specifying such issues as place of arbitration, procedures, and choice
of law.
Table 2
Elements Court jurisdiction Arbitration
Applicable law The law of the court (the judge Parties can choose the law; if they do not,
decides the applicable law) then the law indicated in the contract; if
there is no indication, then the law of the
arbitration body
94
The legal basket
95
Internet Governance
Knowledge and ideas are key resources in the global economy. The protection
of knowledge and ideas, through IPR, has become one of the predominant
issues in the Internet governance debate, and has a strong development-
oriented component. IPR have been affected by the development of the
Internet, mainly through the digitisation of knowledge and information, as
well as through new possibilities for their manipulation. Internet-related IPR
include copyright, trademarks, and patents. Other IPR include designs, utility
models, trade secrets, geographical indications, and plant varieties.
Copyright
Copyright only protects the expression of an idea when it is materialised
in various forms, such as a book, CD, or computer file. The idea itself is not
protected by copyright. In practice, it is sometimes difficult to make a clear
distinction between the idea and its expression.
The copyright regime has closely followed the technological evolution. Every
new invention, such as the printing press, radio, television, and the VCR, has
affected both the form and the application of copyright rules. The Internet
96
The legal basket
The Internet also empowers copyright holders, by providing them with more
powerful technical tools for protecting and monitoring the use of copyrighted
material. These developments endanger the delicate balance between authors
rights and the publics interest, which is the very basis of the copyright law.
97
Internet Governance
Figure 13
These regulatory actions have been harshly criticised by academics and civil
liberties groups on human rights and freedoms grounds. Individual Internet
users have joined online and offline protests.18
98
The legal basket
An article in the New York Times listed the following software-based tactics,
used by recording/entertainment companies to protect their copyrights:
P A Trojan Horse redirects users to websites where they can legitimately
buy the song they tried to download.
P Freeze software blocks computers for a period of time and displays a
warning about downloading pirated music.
P Silence, where hard disks are scanned and an attempt is made to remove
any pirated files found.
P Interdiction prevents access to the Net for those who try to download
pirated music.
Professor Lawrence Lessig of Stanford Law School, has warned that such
measures might be illegal.19 Would the companies that took such self-help
measures be breaking the law?
The use of technological tools for copyright protection find legal basis in
the WIPO Copyright Treaty and in the DMCA. Moreover, the DMCA
criminalises activity that is aimed at circumventing the technological protection
of copyrighted materials.
The issues
99
Internet Governance
However, the opposite view argues that changes in the legal system must be
profound, since copyright in the digital era no longer refers to the right to
prevent copying but also to the right to prevent access. Ultimately, with ever-
greater technical possibilities of restricting access to digital materials, one can
question whether copyright protection is necessary at all. It remains to be seen
how the public interest, the second part of the copyright equation, will be
protected.
Many developing countries are concerned with this development. The WTOs
strict enforcement mechanisms could reduce the manoeuvring room of
developing countries and the possibility of balancing development needs with
the protection of international intellectual property rights. So far, the main
focus of the WTO and TRIPS has been on various interpretations of IPR for
100
The legal basket
A particularly relevant case to the future of copyright on the Internet is the case
against Grokster and StreamCast, two companies that produce P2P file-sharing
software. Following DMCA provisions, the Recording Industry Association of
America (RIAA) requested these companies to desist from the development
of file-sharing technology that contributes to the infringement of copyrights.
Initially, the US courts chose not to hold software companies like Grokster and
StreamCast responsible for possible copyright infringement, under reasonable
circumstances. However, in June 2005, the US Supreme Court ruled that
software developers were responsible for any possible misuse of their software.
The Electronic Frontier Foundation (EFF) noted this case as a prelude to the
wave of lawsuits that followed over the next few years against individuals and
ISPs reaching over 30,000 cases by 2008.25 Although the RIAA abandoned its
litigation campaign, copyright infringement lawsuits still remain in the spotlight
and diversify at the same pace with technological developments.26
Trademarks
101
Internet Governance
This situation compelled the business sector to place the question of the
protection of trademarks at the centre of the reform of Internet governance,
leading to the establishment of ICANN in 1998. In the White Paper on
the creation of ICANN, the US government demanded that ICANN
develop and implement a mechanism for the protection of trademarks in
the field of domain names. Soon after its formation, ICANN introduced the
WIPOdeveloped Universal Dispute Resolution Procedure (UDRP).27
Patents
Cybercrime
The drafters of the CoE Convention on Cybercrime30 were closer to the real-
law approach, stressing that the only specific aspect of cybercrime is the use
of ICT as a means of committing crime. The convention, which entered into
force on 1 July 2004, is the main international instrument in this field.
102
The legal basket
The issues
Definition of cybercrime
The definition of cybercrime has practical relevance and legal implications.
If the focus is on offences committed against computer systems, cybercrime
would include unauthorised access; damage to computer data or programs;
sabotage to hinder the functioning of a computer system or network;
unauthorised interception of data to, from, or within a system or network;
as well as computer espionage. A definition of cybercrime as all crimes
committed via the Internet and computer systems would include a broader
range of crimes, including those specified in the Cybercrime Convention:
computer-related fraud, infringements of copyright, child pornography, and
network security.
103
Internet Governance
Labour law
In the field of labour law, one important issue is the question of privacy in the
workplace. Is an employer allowed to monitor employees use of the Internet
(such as the content of e-mail messages or website access)? Jurisprudence is
gradually developing in this field, with a variety of new solutions on offer.
104
The legal basket
Privacy and data protection are two interrelated Internet governance issues.
Data protection is a legal mechanism that ensures privacy. Yet, what is privacy?
It is usually defined as the right of any citizen to control their own personal
information and to decide about it (to disclose information or not). Privacy is
a fundamental human right. It is recognised in the Universal Declaration of
Human Rights,40 the International Covenant on Civil and Political Rights,41
and in many other international and regional human rights conventions.
105
Internet Governance
National cultures and the way of life influence the practice of privacy.
Although this issue is important in Western societies, it may have lesser
importance in other cultures. Modern practices of privacy focus on
communication privacy (no surveillance of communication) and information
privacy (no handling of information about individuals). Privacy issues, which
used to focus on governmental activities, have been extended and now include
the business sector.42
The issues
The main privacy issues are analysed in a triangle among individuals, states,
and businesses as presented in Figure 15.
After the events of 11 September 2001 in the USA, the US Patriot Act44
and comparable legislation in other countries broadened governments
authority to collect information, including a provision for lawful interception
of information. The concept of lawful interception in gathering evidence is
also included in the CoE Convention on Cybercrime45 (Articles 20 and 21).
Moreover, the EU requested the adoption of national legislation allowing the
retention of data necessary to identify a user for a period of 6 to 24 months.
106
The legal basket
person discloses personal data when opening a bank account, booking a flight
or a hotel, paying online with a credit card, or even browsing or searching the
Internet. Multiple traces of data are often left in each of these activities.
Figure 15
107
Internet Governance
The main problem for protection from this type of privacy violation is that most
legislation focuses on the privacy risks stemming from the state. Faced with this
new reality, a few governments have taken some initial steps. The US Congress
adopted the Video Voyeurism Prevention Act,50 prohibiting the taking of
photos of unclothed people without their approval. Germany and a few other
countries have adopted similar privacy laws, preventing individual surveillance.
108
The legal basket
While the principles of the OECD guidelines have been widely accepted,
the main difference is in the way they are implemented, notably between
the European and US approaches. In Europe there is comprehensive data
protection legislation, while in the USA the privacy regulation is developed
for each sector of the economy including financial privacy (the Graham-
Leach-Bliley Act55), childrens privacy (the Childrens Online Privacy
Protection Act56) and medical privacy (under the Health Insurance Portability
and Accountability Act). 57
109
Internet Governance
This reframed the whole issue and provided a way out of the impasse in the
negotiations.
When it was signed in 2000, the Safe Harbor Agreement was received
with a great hope as the legal tool that could solve similar problems with
other countries. However, the record is not very encouraging. It has been
criticised by the European Parliament for not sufficiently protecting the
privacy of EU citizens. US companies were not particularly enthusiastic
about using this approach. According to a study done by Galexia, out of 1597
companies registered in the Safe Harbor Framework, only 348 meet the basic
requirements (e.g. privacy policy).58 Given the high importance of privacy
and data protection in the relations between the USA and the EU after
the Snowden revelations, it is likely to expect higher pressure to find some
solution for the dysfunctional Safe Harbor Agreement. In his policy speech at
the European Parliament, Jean-Claude Juncker, the newly elected President
of the European Commission mentioned a safe harbour agreement as one of
possibility for solving data protection problems between the European Union
and the United States.
110
The legal basket
Endnotes
1
One of the strongest supporters of the real-law approach is Judge Frank Easterbrook who
is quoted as saying: Go home; cyberlaw does not exist. In the article Cyberspace and the law
of the horse, he argues that although horses were very important there was never a Law of
the Horse. Judge Easterbrook argues that there is a need to concentrate on the core legal
instruments, such as contracts, responsibility, etc. Available at: http://www.law.upenn.edu/
law619/f2001/week15/easterbrook.pdf [accessed 9 August 2014].
Easterbook who is quoted as saying: Go home, cyberlaw does not exist. In the article
Cyberspace and the Law of the Horse, he argues that although horses were very important
there was never a Law of the Horse. Judge Easterbrook argues that there is a need to
concentrate on the core legal instruments, such as contracts, responsibility, etc.
Available at http://www.law.upenn.edu/law619/f2001/week15/easterbrook.pdf
[accessed 13 February 2014]. Judge Frank Easterbrooks argument provoked several
reactions, including one from Lawrence Lessig in The Law of the Horse: What Cyberlaw
Might Teach. Available at http://cyber.law.harvard.edu/works/lessig/LNC_Q_D2.PDF
[accessed 13 February 2014].
2
NTIA (1988) Statement of Policy on the Management of Internet Names and Addresses.
Available at http://www.ntia.doc.gov/federal-register-notice/1998/statement-policy-
management-internet-names-and-addresses [accessed 13 February 2014].
3
Vienna Convention on the Law of Treaties. Available at http://www.ilsa.org/jessup/
jessup11/basicmats/VCLT.pdf [accessed 13 February 2014].
4
Brownlie I (1999) Principles of Public International Law, 5th Ed. Oxford: Oxford University
Press, p. 513.
5
Salis RP (2001) A Summary of the American Bar Associations (ABA) Jurisdiction in
Cyberspace Project: Achieving Legal and Business Order in Cyberspace: A Report on
Global Jurisdiction Issues Created by the Internet. Available at http://www.jstor.org/disc
over/10.2307/40687955?uid=3738216&uid=2&uid=4&sid=21103388060741 [accessed
13 February 2014].
6
Among the most important resources in this field is the Princeton Principles on Universal
Jurisdiction (2001). Available at http://www1.umn.edu/humanrts/instree/princeton.html
[accessed 13 February 2014].
7
Malanczuk P (1997) Akehursts Modern Introduction to International Law. London:
Routledge, p. 113.
8
For an overview of cases involving extraterritorial jurisdiction related to Internet content,
see Timofeeva YA (2005) Worldwide Prescriptive Jurisdiction in Internet Content
Controversies: A Comparative Analysis. Connecticut Journal of International Law, 20, 199.
Available at http://ssrn.com/abstract=637961 [accessed 13 February 2014].
9
EDRI-gram (2006) French anti-hate groups win case against Yahoo! Available at
http://edri.gn.apc.org/edrigram/number4.1/yahoocase [accessed 17 February 2014].
10
Other court cases include the German Federal Court of Justice case against Fredrick Toben,
former German national with Australian nationality who had posted at an Australian-based
111
Internet Governance
112
The legal basket
Introduction
23
The Notice and Take Down procedure refers to the obligation of service providers to
remove content from websites under their administration if they receive a notification or
complaint regarding the legality of that specific content.
24
For fear of facing potential legal sanctions, some ISPs prefer to restrict access to indicated
content even when no infringement has taken place. For details please consult the
following case studies: For Europe (the Netherlands): Nas S (2004) The Multatuli Project
ISP Notice & Take Down, Bits of Freedom. Available at https://www-old.bof.nl/docs/
researchpaperSANE.pdf [accessed 13 February 2014]. For the USA: Urban J and Quilter
L (2006), Efficient Process or Chilling Effects? Takedown Notices Under Section 512
of the Digital Millennium Copyright Act. Available at http://static.chillingeffects.org/
Urban-Quilter-512-summary.pdf [accessed 13 February 2013].
25
EFF (2008) RIAA v. The People: Five Years Later. Available at https://www.eff.org/wp/
riaa-v-people-five-years-later [accessed 13 February 2014].
26
See for example the latest trend in the USA the copyright trolling: Kravets D (2012)
Judge Orders Failed Copyright Troll to Forfeit All Copyrights. Wired.com. Available
at http://www.wired.com/threatlevel/2012/03/troll-forfeits-copyrights [accessed 13
February 2014].
27
For a comprehensive survey of the main issues involving UDRP please consult WIPO
(2011) WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Second
Edition (WIPO Overview 2.0) Available at http://www.wipo.int/amc/en/index.html
[accessed 13 February 2014].
28
Loney M (2002) Hyperlink patent case fails to click. CNET News.com. Available at
http://news.cnet.com/2100-1033-955001.html [accessed 13 February 2014].
29
For more information about the debate in Europe on software patentability, please consult
http://eupat.ffii.org [accessed 13 February 2014].
30
Council of Europe Convention on Cybercrime (2001) Available at http://conventions.
coe.int/Treaty/en/Treaties/Html/185.htm [accessed 13 February 2014].
31
For a listing of anti-cybercrime networks, organisations and initiatives worldwide see the
Council of Europes resources page, available at http://www.coe.int/t/dghl/cooperation/
economiccrime/cybercrime/Documents/networks/Networks_en.asp [accessed 13
February 2014].
32
Commonwealth Internet Governance Forum (2012) Commonwealth Cybercrime
Initiative. Available at http://www.commonwealthigf.org/cigf/cybercrime [accessed 13
February 2014].
33
As an example see McAfee Initiative to Fight Cybercrime site and its Multipoint Strategy.
Available at http://www.mcafee.com/us/campaigns/fight_cybercrime/strategy.html
[accessed 13 February 2014].
34
For critical views of the Cybercrime Convention expressing the concern of civil society
and human rights activists, please consult: The Association for Progressive Communication
Report on the Cybercrime Convention. Available at http://rights.apc.org/privacy/
treaties_icc_bailey.shtml [accessed 13 February 2014].
113
Internet Governance
35
European Parliament (2006) Data Retention Directive. Available at http://eur-lex.europa.
eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:105:0054:0063:EN:PDF [accessed 13
February 2014].
36
For a detailed overview of the data retention issues in EU see European Commission
(2011) Evaluation report on the Data Retention Directive (Directive 2006/24/EC).
Available at http://www.publications.parliament.uk/pa/cm201012/cmselect/
cmeuleg/428-xxix/42816.htm [accessed 13 February 2014].
37
The Register (2007) EU court rules monitoring of employee breached human rights. 5
April. Available at http://www.theregister.co.uk/2007/04/05/monitoring_breached_
human_rights [accessed 13 February 2014].
38
See the following articles for example: Holding R (2011) Can You Be Fired for Bad-
Mouthing Your Boss on Facebook? Time U.S. Available at http://www.time.com/time/
nation/article/0,8599,2055927,00.html [accessed 13 February 2014]. Broughton A et al.
(2009) Workplaces and Social Networking. The Implications for Employment Relations,
Acas. Available at http://www.acas.org.uk/media/pdf/d/6/1111_Workplaces_and_
Social_Networking.pdf [accessed 13 February 2014].
39
Valuable comments and inputs were provided by Katitza Rodriguez.
40
UN (no date) Universal Declaration of Human Rights. Available at http://www.un.org/
en/documents/udhr/index.shtml#a12 [accessed 13 February 2014].
41
UNHCR (no date) International Covenant on Civil and Political Rights. Available at
http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx [accessed 27 March
2014].
42
A report issued by the American Civil Liberties Union: Stanley J (2004). The surveillance-
industrial complex: How the American government is conscripting businesses and
individuals in the construction of a surveillance society. This report explains the problem
of the privatisation of surveillance and new challenges linked to the protection of privacy.
Available at https://www.aclu.org/files/FilesPDFs/surveillance_report.pdf [accessed 13
February 2014].
43
UCLA (no date) What is data mining? Available at http://www.anderson.ucla.edu/
faculty/jason.frand/teacher/technologies/palace/datamining.htm [accessed 17 February
2014].
44
Epic.org (no date) US Patriot Act. Available at http://epic.org/privacy/terrorism/
hr3162.html [accessed 13 February 2014].
45
Council of Europe (2001) Convention on Cybercrime. Available at http://conventions.
coe.int/Treaty/en/Treaties/Html/185.htm [accessed 13 February 2014].
46
TRUSTe, the organisation that developed a privacy seal mark to certify compliance of
websites with the privacy requirements, is also monitoring consumer confidence online.
For the latest results of their survey see: TRUSTe Launches New Privacy Index Measuring
Consumer Privacy Insights and Trends. San Francisco, California, 13 February 2012.
Available at http://www.truste.com/about-TRUSTe/press-room/news_truste_
launches_new_trend_privacy_index [accessed 13 February 2013].
114
The legal basket
47
The privacy focus and concern related to social networking sites are very well illustrated by
the attentive monitoring and pressure exerted by media civil rights advocates on Facebook.
For an overview of the wide range of privacy issues raised in relation to the use of this
platform see Wikipedia (2012) Criticism of Facebook. Available at http://en.wikipedia.
org/wiki/Criticism_of_Facebook [accessed 13 Facebook 2013].
48
For an overview of the most prominent privacy breaches over time (though with a US
focus) see Marsan C (2012) 15 worst Internet privacy scandals of all time. Network World
26 January. Available at http://www.networkworld.com/news/2012/012612-privacy-
scandals-255357.html?page=1 [accessed 13 February 2014].
49
The Economist (2004) Move over, Big Brother. 2 December. Available at http://www.
economist.com/node/3422918 [accessed 13 February 2014].
50
Gov.track.us (no date) Video Voyeurism Prevention Act. Available at http://www.
govtrack.us/congress/bills/108/s1301 [accessed 13 February 2014].
51
Council of Europe (no date) Convention for the protection of individual with regard to
automatic processing of personal data. Available at http://conventions.coe.int/treaty/en/
treaties/html/108.htm [accessed 13 February 2014].
52
Europa (no date) Protection of personal data. Available at http://europa.eu/legislation_
summaries/information_society/data_protection/l14012_en.htm [accessed 11 April
2012].
53
More details about the reform process are available at http://europa.eu/legislation_
summaries/information_society/data_protection/l14012_en.htm [accessed 13 February
2014].
54
OECD (1980) Guidelines on the Protection of Privacy and Transborder Flows
of Personal Data. Available at http://www.oecd.org/internet/ieconomy/
oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm
[accessed 13 February 2014].
55
Graham-Keach-Bliley Act. Available at http://www.ftc.gov/privacy/glbact/glbsub1.htm
[accessed 13 February 2014].
56
Childrens Online Privacy Protection Act. Available at http://www.ftc.gov/enforcement/
rules/rulemaking-regulatory-reform-proceedings/childrens-online-privacy-
protection-rule [accessed 13 February 2014].
57
Health Information Privacy. Available at http://www.hhs.gov/ocr/privacy/ [accessed 13
February 2014].
58
Connolly C (2008) The US Safe Harbor Fact or Fiction? Galexia. Available at http://
www.galexia.com/public/research/articles/research_articles-pa08.html [accessed 13
February 2014].
115
Internet Governance
116
Section 4
The economic
basket
Internet Governance
118
The economic basket
T
his quote from David Clark, chief Internet protocol architect, reflected
the spirit of the early Internet community, where the non-profit
Internet project was supported mainly by US research grants. But, in
the 1990s and early 2000s new business models for routing dollars started to
emerge in Silicon Valley centred on income from advertising.
Nguyen and Armitrage argue that the Internet should have a proper and
optimal balance between three elements: technical efficiency, economic
efficiency, and social effects.1 Other authors highlight the challenges of
replacing the existing, simple, flat-rate pricing structure with a more complex
one, such as accounting based on the traffic of packets.2 With regard to
practical changes, some believe that changing the current Internet economic
policies could open a Pandoras box.
119
Internet Governance
E-commerce
E-commerce has been one of the main engines promoting the growth of the
Internet over the past 15 years. The importance of e-commerce is illustrated
by the title of the document that initiated the reform of Internet governance
and established ICANN: the 1997 Framework for Global Electronic
Commerce,4 which states that the private sector should lead the Internet
governance process and that the main function of this governance will be to
enforce a predictable, minimalist, consistent, and simple legal environment for
commerce. These principles are the foundation of the ICANN-based Internet
governance regime.
Definition
The choice of a definition for e-commerce has many practical and legal
implications. Specific rules are applied depending on whether a particular
transaction is classified as e-commerce, such as those regulating taxation and
customs.
120
The economic basket
traditional mail. The WTO defines e-commerce more precisely as: the
production, distribution, marketing, sale, or delivery of goods and services by
electronic means.5 The EU approach to e-commerce deals with information
society services that cover any service normally provided for remuneration,
at a distance, by means of electronic equipment for the processing (including
digital compression) and storage of data, and at the individual request of a
recipient of a service.6
121
Internet Governance
What should the link be between TRIPS and the protection of IPR on the
Internet?
Since the WTOs TRIPS agreement provides much stronger enforcement
mechanisms for IPR, developed countries have been trying to extend TRIPS
coverage to e-commerce and to the Internet by using two approaches. First, by
citing the principle of technological neutrality, they argue that TRIPS, like
other WTO rules, should be extended to any telecommunication medium,
including the Internet. Second, some developed countries have requested
the closer integration of WIPOs digital treaties into the TRIPS system.
TRIPS provides stronger enforcement mechanisms than WIPO conventions.
Both issues remain open and they will become increasingly important in
future WTO negotiations. During the current stage of trade negotiations,
it is not very likely that e-commerce will receive prominent attention on
the WTO agenda. The lack of global e-commerce arrangements will be
partially compensated by some specific initiatives (e.g. regarding contracts and
signatures) and various regional agreements, mainly in the EU and the Asia-
Pacific region.
122
The economic basket
Regional initiatives
The EU developed an e-commerce strategy at the so-called Dot Com Summit
of EU leaders in Lisbon (March 2000). Although it embraced a private
and market-centred approach to e-commerce, the EU also introduced a
few corrective measures aimed at protecting public and social interests (the
promotion of universal access, a competition policy involving consideration of
the public interest, and a restriction in the distribution of harmful content).
The EU adopted the Directive on Electronic Commerce19 as well as a set of
other directives related to electronic signatures, data protection, and electronic
financial transactions.
123
Internet Governance
Figure 16
Users pay for provided services with their data, including information they
generate their electronic footprint as they search and interact on the
Internet. Internet companies analyse user data in order to extract bits of
information about their preferences, tastes, and habits. They also mine the
data to extract information about a group; for instance the behaviour of
teenagers in a particular city or region. Internet companies can predict with
high certainty what a person with a certain profile is going to buy or do. This
valuable block of data about Internet users has different commercial uses.
Mainly, it is purchased by vendors who use it for their marketing activities.
For example, in 2013, 90% of Googles US $55.5 billion annual revenue came
from advertising and related services.21
124
The economic basket
Issues
Internet users and companies pay ISPs for Internet access and services.
Typically ISPs have to cover the following expenses from the fees collected:
P Cost of telecommunication expenses and Internet bandwidth to the next
major Internet hub.
P Cost of IP addresses obtained from regional Internet registries (RIRs) or
local Internet registries (LIRs). An IP address is needed by a device to
access the Internet.
P Cost of equipment, software, and maintenance of their installations.
125
Internet Governance
Figure 17
The issues
126
The economic basket
The proposal did not gain support in the preparation for WCIT-12, but it
is likely to remain an open issue in future Internet governance negotiations.
This discussion on the redistribution of Internet revenue strongly underpins
the network neutrality debate for example, should all Internet traffic have
the same status as it does today, or should it be segregated into different
Internet(s) depending on the quality of services, payment, and reliability (e.g.
having a range of Internets from VIP Internet to an Internet for the poor).
Developing countries have been raising the question of fairer Internet access
business models during WSIS, ITU working groups, and, more recently, at
WCIT-12 in Dubai.
127
Internet Governance
Unlike e-money, virtual currencies are not part of a national financial system.
Issuing virtual currencies would be akin to printing money without the
control of a central banking institution. Bitcoin is the most well-known virtual
currency, and is also described as a cryptocurrency, since it is created through a
special process based on cryptography.26
The issues
Mobile commerce
E-payments and e-money are currently undergoing fast changes at the same pace as
technology and devices evolve and develop. Mobile payments have already surpassed
the simple orders placed via SMS at the beginning, as mobile phones became more
sophisticated and intelligent (like smart phones and iPhones) allowing for diverse
applications, including for mobile commerce.28
Cybersecurity
Cybersecurity is one of the main challenges to the wider deployment of
e-payments. How can the safety of financial transactions via the Internet be
ensured? Cybersecurity has been already been discussed. On this point, it is
128
The economic basket
National initiatives
In order to foster the development of e-commerce, governments worldwide
need to encourage all forms of cash-free payments, including credit cards
and e-money. The faster introduction of e-money will require additional
governmental regulatory activities. After Hong Kong, the first to introduce
comprehensive e-money legislation, the EU adopted the Electronic Money
Directive31 in 2000 (it was revised in 2009). Unlike e-money, there is no
regulation of virtual currency in the EU. Currently, it is left to the member
states to regulate virtual currencies such as Bitcoin. Germany considers
Bitcoin as private money exchanged between two persons or entities. In the
UK, it is a considered a means of exchange but not money. Most countries
have chosen a wait and see approach. Currently, Bitcoin does not present a
major risk for the monetary system in the form of various misuses (money
laundering, theft, etc.). However, some countries, such as Russia and Thailand,
have taken more radical steps by banning Bitcoin.
129
Internet Governance
Regarding virtual currency, the main international initiative has been taken
in the Financial Action Task Force (FATF) which addresses the questions of
money laundering and the financing of terrorism.33 The USA has initiated
discussions in the FATF on how to apply rules against money laundering and
the financing of terrorism in the field of virtual currencies.
Privacy
The use of e-payment systems leaves a trace of every transaction performed
which is recorded by the issuers of the e-payment instrument (credit card
companies, banks). While the keeping of such records is needed and justifiable
for clearing purposes and evidence of payments, the aggregation of such data
may pose serious threats to users privacy if data mining is used for tracking
purchasing and spending habits or scoring clients for provision of future
financial services.35
There are many warnings that virtual currencies could be misused for illegal
goods and services, fraud, and money laundering. The anonymity of Bitcoin
transactions increases the potential for possible misuse. So far, there have only
been a few cases of reported misuse. The FBI closed the Silk Road website
which was used to trade in stolen card data, drugs, and other illegal products;
the website used Bitcoin as its payment method.
Consumer protection
130
The economic basket
131
Internet Governance
More than half of EU consumers (53%) made at least one purchase online in
the 12 months to September 2012, almost doubling since 2006. Yet just 15%
purchased online from vendors outside their own country. This is reflected
in the confidence rating: while 53% feel comfortable purchasing from online
domestic retailers, only 36% feel comfortable buying online from another EU
country.42
Taxation
With the Internet moving into the mainstream of modern society, the
question of taxation has come into sharper focus. It has become even more
important since the financial crisis in 2008. Many governments have been
trying to increase fiscal income in order to reduce growing public debt.
The most comprehensive report on Internet taxation was presented by the
French Ministry of Economy and Finance in January 2013.45 The taxation
of economic activities on the Internet became one of the first possibilities for
increasing fiscal income.
132
The economic basket
tax-free zone. In 1998, the US Congress adopted the Internet Tax Freedom
Act,47 which was extended for another three years in December 2004. In
October 2007, the Act was extended until 2014, in spite of some fears that it
could lead to a substantial revenue loss.48
The OECD and the EU have promoted the opposite view, i.e., that the
Internet should not have special taxation treatment. The OECDs Ottawa
Principles specify that taxation of e-commerce should not be based on the
same principles as taxation for traditional commercial activities.49 By applying
this principle, the EU introduced a regulation in 2003 requesting non-EU
e-commerce companies to pay value added tax (VAT) if they sold goods
within the EU. The main motivation for the EUs decision was that non-EU
(mainly US) companies had an edge over European companies, which had to
pay VAT on all transactions, including electronic ones.
Digital signatures
133
Internet Governance
The issues
134
The economic basket
135
Internet Governance
Endnotes
1
Thuy T, Nguyen T, Armitage GJ (2005) Evaluating Internet Pricing Schemes: A Three-
Dimensional Visual Model. ETRI Journal 27(1) pp. 64-74. Available at http://etrij.etri.
re.kr/etrij/journal/article/article.do?volume=27&issue=&page=64? [accessed 13
February 2014].
2
Hayel Y, Maille P, Tuffin B (2005) Modelling and analysis of Internet Pricing: introduction
and challenges in Proceedings of the International Symposium on Applied Models and Data
Analysis (ASMDA), Brest, France. Available at http://conferences.telecom-bretagne.eu/
asmda2005/IMG/pdf/proceedings/1389.pdf [accessed 13 February 2014].
3
Andrew Odlyzko views the question of pricing and architecture on the Internet from
a historical perspective. Identifying the thread in the pricing policy from the pricing of
transportation systems in the ancient world, he links with the current Internet pricing
policy. For more information, consult: Odlyzko A (2004) Pricing and Architecture of the
Internet: Historical Perspectives from Telecommunications and Transportation. Available at
http://www.dtc.umn.edu/~odlyzko/doc/pricing.architecture.pdf [accessed 13 February
2014].
4
The White House (1997) Framework for Global Electronic Commerce. Available at http://
clinton4.nara.gov/WH/New/Commerce/ [accessed 17 February 2014].
5
WTO (1998) Work programme on electronic commerce. Available at http://www.wto.
org/english/tratop_e/ecom_e/wkprog_e.htm [accessed 17 February 2014].
6
European Union [EU] (2000) Directive 2000/31/EC of the European Parliament
and of the Council of 8 June 2000 on certain legal aspects of information society
services, in particular electronic commerce, in the Internal Market (Directive on
electronic commerce). Available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.
do?uri=CELEX:32000L0031:EN:NOT [accessed 17 February 2014].
7
Global Web Index. GlobalWebIndex e-Commerce Report: Online Plays a Role in 90% of
Transactions. Available at http://blog.globalwebindex.net/globalwebindex-e-commerce-
report-online-plays-a-role-in-90-of-transactions/ [accessed 10 August 2014].
8
WTO (no date) GATT and the Goods Council. Available at http://www.wto.org/
english/tratop_e/gatt_e/gatt_e.htm [accessed 17 February 2014].
9
WTO (1994) Agreement on Trade-related Aspects of Intellectual Property Rights.
Available at http://www.wto.org/english/tratop_e/trips_e/t_agm0_e.htm [accessed 17
February 2014].
10
This section of the WTO website focuses on e-commerce. Available at http://www.wto.
org/english/tratop_e/ecom_e/ecom_e.htm [accessed 17 February 2014].
11
For more information about the USA/Antigua Online Gambling Case, please consult
http://www.wto.org/english/tratop_e/dispu_e/cases_e/ds285_e.htm [accessed 17
February 2014].
12
UNCITRAL website. Available at http://www.uncitral.org/uncitral/index.html
[accessed 17 February 2014].
136
The economic basket
13
UNCITRAL (1996) Model Law on Electronic Commerce. Available at http://www.
uncitral.org/uncitral/en/uncitral_texts/electronic_commerce/1996Model.html
[accessed 17 February 2014].
14
ebXML website. Available at http://www.ebxml.org/ [accessed 17 February 2014].
15
See for example a discussion about the relevance of ebXML standard today. Available at
http://www.infoq.com/news/2012/01/ebxml [accessed 17 February 2014].
16
UNCTAD (no date) Economic reports. Available at http://unctad.org/en/Pages/
Publications/InformationEconomyReportSeries.aspx [accessed 17 February 2014].
17
International Chamber of Commerce website. Available at http://www.iccwbo.org/
[accessed 17 February 2014].
18
The Global Business Dialogue website. Available at http://www.gbdinc.org/ [accessed 17
February 2014].
19
European Commission (no date) E-commerce directive. Available at http://ec.europa.eu/
internal_market/e-commerce/directive_en.htm [accessed 17 February 2014].
20
APEC (no date) Paperless Trading Individual Action Plan. Available at http://www.apec.
org/Groups/Committee-on-Trade-and-Investment/Electronic-Commerce-Steering-
Group/Paperless-Trading-Individual-Action-Plan.aspx [accessed 17 February 2014].
21
Google (no date) Investor relations. Available at http://investor.google.com/financial/
tables.html [accessed 10 August 2014].
22
Huston G (2005) Wheres the Money? Internet Interconnection and Financial Settlements.
The ISP Column. Available at http://www.potaroo.net/ispcol/2005-01/interconn.pdf
[accessed 13 February 2014].
23
As quoted in Holland K and Cortese A (1995) The future of money: e-cash could
transform the worlds financial life. Available at http://www.businessweek.com/1995/24/
b3428001.htm [accessed 17 February 2014].
24
As reported in Olson T (2012) Higher costs, new laws mean no more free rides on some
bank services, accounts. Pittsburgh Tribune-Review, April 1. Available at http://www.
pittsburghlive.com/x/pittsburghtrib/business/s_789300.html [accessed 17 February
2014].
25
Basel Committee on Banking Supervision (1998) Risk Management for Electronic Banking
and Electronic Money Activities. Basel March 1998 Available at http://www.bis.org/publ/
bcbs35.pdf [accessed 17 February 2014]. Final version published in 2003 and available at
http://www.bis.org/publ/bcbs98.htm [accessed 17 February 2014].
26
Kamberi A (2014) Cryptocurrencies and bitcoin. Available at http://www.diplomacy.edu/
blog/cryptocurrencies-and-bitcoin [accessed 10 August 2014].
27
This article provides an introduction to online banking and a survey of the advantages and
disadvantages in comparison to traditional banking. Available at http://www.bankrate.
com/brm/olbstep2.asp [accessed 17 February 2014].
28
appsworldblog (2011) 5 Reasons why you need to be ready for Mobile Payments. August
10. Available at http://www.apps-world.net/blog/2011/08/10/5-reasons-why-you-need-
to-be-ready-for-mobile-payments/ [accessed 17 February 2014].
137
Internet Governance
29
Soxlaw (no date) A guide to the Sarbanes Oxley Act. Available at http://www.soxlaw.com/
[accessed 17 February 2014].
30
For more information, consult: Jacobs E (no date), Security as a Legal Obligation: About
EU Legislation Related to Security and Sarbanes-Oxley in the European Union. Available
at http://www.arraydev.com/commerce/JIBC/2005-08/security.htm [accessed 17
February 2014].
31
European Commission (no date) E-money. Available at http://ec.europa.eu/internal_
market/payments/emoney/index_en.htm [accessed 17 February 2014].
32
The Basel Group is based at the Bank for International Settlements. It provides a Survey
of Developments in Electronic Money and Internet and Mobile Payments. Available at http://
www.bis.org/publ/cpss62.pdf [accessed 17 February 2014].
33
FATF website. Available at http://www.fatf-gafi.org/pages/aboutus/ [accessed 10 August
2014].
34
Richtel M (2002) PayPal and New York in Accord on Gambling. The New York Times,
August 22. Available at http://www.nytimes.com/2002/08/22/business/technology-
paypal-and-new-york-in-accord-on-gambling.html?src=pm [accessed 17 February
2014].
35
Prater C (2009) What you buy, where you shop may affect your credit. Available at http://
www.creditcards.com/credit-card-news/how-shopping-can-affect-credit-1282.php
[accessed 17 February 2014].
36
Villar R, Knight S, Wolf B (2014) Bitcoin exchange Mt. Gox goes dark in blow to virtual
currency. Available at http://www.reuters.com/article/2014/02/25/us-mtgox-website-
idUSBREA1O07920140225 [accessed 10 August 2014].
37
OECD (1999) Guidelines for Consumer Protection in the Context of
Economic Commerce. Available at http://www.oecd.org/internet/consumer/
oecdguidelinesforconsumerprotectioninthecontextofelectroniccommerce1999.htm
[accessed 17 February 2014].
38
OECD (2003) Guidelines for Protecting Consumers from Fraudulent and
Deceptive Commercial Practices. Available at http://www.oecd.org/sti/consumer/
oecdguidelinesforprotectingconsumersfromfraudulentanddeceptive
commercialpracticesacrossborders2003.htm [accessed 17 February 2014].
39
Better Business Bureaus website. Available at http://www.bbb.org/us/cbbb/ [accessed 17
February 2014].
40
European Union (no date) Regulation (EC) No 44/2001 (Brussels I Regulation). Available
at http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32001R0044
[accessed 11 August 2014].
41
European Union (no date) Regulation (EU) No 1215/2012 (Recast Brussels I Regulation).
Available at http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2012:351:0
001:0032:en:PDF [accessed 11 August 2014].
42
The Gallup Organisation (2013) Consumer attitudes towards cross-border trade and consumer
protection. Analytical Report. Flash Eurobarometer. Available at http://ec.europa.eu/
public_opinion/flash/fl_358_sum_en.pdf [accessed 14 August 2014].
138
The economic basket
43
UNCITRAL (1980) UN CISG. Available at http://www.uncitral.org/uncitral/uncitral_
texts/sale_goods/1980CISG.html [accessed 17 February 2014].
44
Maastricht Economic Research Institute on Innovation and Technology (MERIT) (1999).
Cybertax. Available at www.merit.unu.edu/publications/rmpdf/1998/rm1998-020.pdf
[accessed 17 February 2014].
45
Collin P, Colin N (2013) Mission dexpertise sur la fiscalit de lconomie numrique.
Available at http://www.redressement-productif.gouv.fr/files/rapport-fiscalite-du-
numerique_2013.pdf [accessed 10 August 2014].
46
For a discussion on various aspects of taxation policy and the Internet, please consult:
Cockfield AJ (2001) Transforming the Internet into a Taxable Forum: A Case Study
in E-Commerce Taxation, 85 Minn. L. Rev. 1171, 1235-1236; Morse EA (1997) State
Taxation of Internet Commerce: Something New under the Sun? 30 Creighton L. Rev.
1113, 1124-1227; Williams WR (2001) The Role of Caesar in the Next Millennium?
Taxation of E-Commerce: An Overview and Analysis, 27 Wm Mitchell L. Rev. 1703, 1707.
47
Internet Tax Freedom Act. Available at http://legacy.gseis.ucla.edu/iclp/itfa.htm
[accessed 17 February 2014].
48
Mazerov M (2007) Making the Internet Tax Freedom Act permanent could lead to a
substantial revenue loss for states and localities. Available at http://www.cbpp.org/7-11-
07sfp.htm [accessed 17 February 2014].
49
The Ottawa Taxation Principles are: Neutrality, Efficiency, Certainty and simplicity,
Effectiveness and fairness, Flexibility. See OECD (2003) Implementation of the Ottawa
Taxation Framework Conditions. The 2003 Report. Available at http://www.oecd.org/tax/
administration/20499630.pdf [accessed 17 February 2014].
50
For a more detailed explanation of these three approaches, please consult: ILPF (no date)
Survey of International Electronic and Digital Signature Initiatives. Available at http://
www.ilpf.org/groups/survey.htm#IB [accessed 17 February 2014].
51
European Commission (1999) Directive on Electronic Signatures. Available at http://
eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31999L0093:en:HTML
[accessed 17 February 2014].
52
European Commission (2006) Report on the Operation of Directive 1999/93/EC on a
Community Framework for Electronic Signatures. Available at http://eur-lex.europa.
eu/LexUriServ/%20LexUriServ.do?uri=COM:2006:0120:FIN:EN:PDF [accessed 17
February 2014].
53
UNCITRAL (2001) Model Law on Electronic Signatures. Available at http://www.
uncitral.org/uncitral/uncitral_texts/electronic_commerce/2001Model_signatures.html
[accessed 17 February 2014].
54
More information on GUIDEC elaboration can be found on the ICC dedicated webpage.
Available at http://www.iccwbo.org/policy/ebitt/id2340/index.html [accessed 17
February 2014].
55
Longmuir G (2000) Privacy and Digital Authentication. Available at http://caligula.anu.
edu.au/~gavin/ResearchPaper.htm [accessed 17 February 2014]. This paper focuses on
the personal, community, and governmental aspects of the need for authentication in a
digital world.
139
Internet Governance
140
Section 5
The development
basket
Internet Governance
142
The development basket
T
echnology is never neutral. The history of human society provides
many examples of technology empowering some individuals, groups,
or nations, while excluding others. The Internet is no different in
this respect. From the individual to the global level, a profound change has
occurred in the distribution of wealth and power. The impact of the Internet
on the distribution of power and development has given rise to many
questions, including:
The answers to these and other questions require an analysis of the relevance
of development within the context of Internet governance. Almost every
Internet governance issue has a developmental aspect:
P The existence of a telecommunication infrastructure facilitates access, the
first precondition for overcoming the digital divide.
P The current economic model for Internet access, which places a
disproportionate burden on those developing countries that have to
finance access to backbones based in developed countries.
P The global regulation of intellectual property rights, which directly affects
development, because of the reduced opportunity of developing countries
to access knowledge and information online.
143
Internet Governance
This axis of concern was continued within the IGF, where the development
theme was highlighted starting with the first meeting in Athens (2006) and
continued to be present with dedicated workshops and even a main session
in Vilnius (2010). Development-related concerns were among the top five
most frequently raised issues in the context of the debate on the continuation
of the IGF, notably improving participation from developing countries and
increasing the priority given to development.4
The digital divide can be defined as a rift between those who, for technical,
political, social, or economic reasons, have access and capabilities to use
ICT/Internet, and those who do not. Various views have been put forward
about the size and relevance of the digital divide. Digital divide(s) exist at
different levels: within countries and between countries, between rural and
urban populations, between the old and the young, as well as between men
144
The development basket
and women. The OECD refers to the digital divide as the gap between
individuals, households, businesses and geographic areas at different
socioeconomic levels with regard both to their opportunities to access
information and communication technologies (ICTs) and to their use of the
Internet for a wide variety of activities.6
Some opposing views argue that statistics on the digital divide are often
misleading and that the digital divide is in fact not widening at all. According
to this view, the traditional focus on the number of computers, the number
of Internet websites, or the available bandwidth should be replaced with
a focus on the broader impact of ICT/Internet on societies in developing
countries. Frequently quoted examples are the digital successes of Brazil,
India, and China. However, the criteria for assessing the digital divide gaps
are also changing and becoming more complex in order to better capture the
development realities. Current assessments take into account aspects like ICT
readiness and overall ICT impact on society. The World Economic Forum
has developed the Networked Readiness Index (NRI) as a new approach in
measuring the Internet-level of countries worldwide.8 It also provides new
perspectives on how the digital divide is addressed.
Universal access
In addition to the digital divide, another frequently mentioned concept in the
development debate is universal access, i.e., access for all. Although it should
be the cornerstone of any digital development policy, differing perceptions
145
Internet Governance
and conceptions of the nature and scope of this universal access policy remain.
The question of universal access at global level remains largely an open issue,
ultimately dependent on the readiness of developed countries to invest in the
realisation of this goal.
Access to the Internet is one of the main challenges to overcoming the digital
divide. The Internet penetration rate in 2012 in Africa was 16.6%, compared
to 78.6% in North America or 63.2% in Europe, but it registered the highest
growth in the last decade.10 There are two main aspects related to access to
the Internet in developing countries. First is access to international Internet
backbones. Second is connectivity within developing countries.
146
The development basket
Small and remote islands face similar challenges in accessing the Internet, as
many depend on expensive satellite connectivity. Efforts are underway to find
the most efficient solutions for connectivity in such areas.11
147
Internet Governance
Who should cover the cost of links between developing and developed
countries?
When an end-user in Africa sends an e-mail to a correspondent in Europe or
the USA, it is the African ISP who bears the cost of international connectivity
from Africa to the USA. Conversely, when a European end-user sends an
e-mail to Africa, it is still the African ISP who bears the cost of international
connectivity, and ultimately the African end-user who bears the brunt by
paying higher subscriptions.
Financial support
During the WSIS process, the importance of financial support for bridging
the digital divide was clearly recognised. One idea proposed at WSIS
was the establishment of a UN-administered Digital Solidarity Fund to
help technologically disadvantaged countries build telecommunication
infrastructures. However, the proposal to establish a Digital Solidarity Fund
did not garner broad support from the developed countries, which favoured
direct investment instead of the establishment of a centralised development
fund.
148
The development basket
Sociocultural aspects
For developing countries, one of the main issues has been brain drain, described
as the movement of highly skilled labour from developing to developed
countries. Through brain drain, developing countries lose out in a number of
ways. The main loss is in skilled labour. Developing countries also lose their
investment in the training and education of the migrating skilled labour.
It is likely that brain drain will continue, given the various employment/
emigration schemes that have been introduced in the USA and other
developed countries in order to attract skilled, mainly ICT-trained, labour.
One development that may stop or, in some cases, even reverse this brain
drain, is the increase in the outsourcing of ICT tasks to developing countries.
The most successful examples have been the development of Indias software
industry centres, such as Bangalore and Hyderabad.
149
Internet Governance
150
The development basket
time as, privatising government-owned operators; in this way, they will reduce
costs faster than those countries that privatise first and introduce competition
later.
151
Internet Governance
Endnotes
1
United Nations General Assembly [UNGA] (2002) Resolution 56/183. World Summit
on the Information Society (A/RES/56/183). Available at http://www.itu.int/wsis/docs/
background/resolutions/56_183_unga_2002.pdf [accessed 24 February 2014].
2
United Nations (2000) Millennium Declaration. Available at http://www.un.org/
millennium/declaration/ares552e.htm [accessed 24 February 2014].
3
United Nations (no date) Millennium Development Goals. Available at http://www.
un.org/millenniumgoals/ [accessed 24 February 2014].
4
auDA (no date) Continuation of the Internet Governance Forum. Analysis of the
Note of the Secretary-General. Available at http://www.intgovforum.org/cms/2010/
contributions/Open%20Consultation%20on%20Enhanced%20Cooperation%20-%20
auDA%20submission.pdf [accessed 24 February 2014].
5
The Economist (2000) A survey of the new economy: Falling through the Net? For the
developing world, IT is more of an opportunity than a threat. Available at http://www.
economist.com/node/375645 [accessed 24 February 2014].
6
OECD (2001) Understanding the Digital Divide. p. 5. Available at http://www.oecd.org/
internet/ieconomy/1888451.pdf [accessed 24 February 2014].
7
G8 (2001) Digital Opportunities for All: Meeting the Challenge. Report of the Digital
Opportunity Task Force (DOT Force) including a proposal for a Genoa Plan of Action.
Available at http://www.g7.utoronto.ca/summit/2001genoa/dotforce1.html [accessed
24 February 2014].
8
WEF (2013) Global Information Technology Report. Available at http://www.weforum.org/
reports/global-information-technology-report-2013 [accessed 10 August 2014].
9
European Union [EU] (no date) Universal Service. Available at http://ec.europa.eu/
digital-agenda/en/universal-service [accessed 24 February 2014].
10
Internet World Stats (2012) Internet Usage Statistics. The Internet Big Picture. Available at
http://www.internetworldstats.com/stats.htm [accessed 24 February 2014].
11
For more information on the Pacific Islands situation, see the Economic and Social
Commission for Asia and Pacific (2014). Available at http://www.unescap.org/about
[accessed 28 March 2014].
12
For a study on the impact of IXPs implementation in Kenya and Nigeria, see Internet
Society (no date) Internet exchange points (IXPs). Available at http://internetsociety.org/
what-we-do/issues/internet-exchange-points-ixps [accessed 24 February 2014].
13
Huston G (2005) Wheres the Money? Internet Interconnection and Financial Settlement
The ISP Column, January 2005, Internet Society, pp. 7-9. Available at http://www.potaroo.
net/ispcol/2005-01/interconn.pdf [accessed 24 February 2014].
152
The development basket
14
One of the limitations of negotiating this issue between governments is that most
interconnection agreements are concluded between private telecommunication operators.
They are often confidential. ITU recommendations are available at http://www.itu.int/
rec/T-REC-D.50/e [accessed 10 August 2014].
15
India announced the launch of a government-subsidised tablet computer of only $35,
according to BBC News South Asia (2011) India launches Aakash tablet computer priced
at $35. 5 October. Available at http://www.bbc.co.uk/news/world-south-asia-15180831
[accessed 24 February 2014].
153
Internet Governance
154
Section 6
The sociocultural
basket
Internet Governance
156
The sociocultural basket
T
he Internet has made a considerable impact on the social and cultural
fabric of modern society. It is difficult to identify any segment of our
social life that is not affected by it. It introduces new patterns of social
communication, breaks down language barriers, and creates new forms of
creative expressions to name but a few of its effects. Today, the Internet is as
much a social phenomenon as it is a technological one.
Human rights
157
Internet Governance
Estonia was the first country to legally guarantee the right to access the Internet
through a universal services legislation.2 As of July 2010 all citizens in Finland have
the right to a one-megabit broadband connection.3 Yet the right to Internet access
is argued more in relation to the freedom of expression and information than the
actual speed of Internet connection. And opinions are still nuanced regarding a
firm worldwide recognition of access to the Internet as a human right, since access
involves different valences from access to infrastructure to access to content as
the United Nations Human Rights Council report points out.4
Still, there are reluctant opinions to considering broadband as a basic human right,
when there are people still fighting for clean water, medical attention, and food. Will
this take effort and resources away from addressing more basic human rights?
158
The sociocultural basket
controversy around the right balance between Articles 19 and 29 in the real
world is mirrored in discussions about achieving this balance on the Internet.
The Internet provides new possibilities for social inclusion of people with
disabilities. In order to maximise technological possibilities for people with
disabilities, there is a need to develop the necessary Internet governance
and policy framework. The main international instrument in this field is the
Convention on the Rights of Persons with Disabilities,12 adopted by UN in
2006 and signed by 159 countries (April 2014), which establishes rights that
are now in the process of being included in national legislation, which will
make them enforceable.
Awareness of the need for technological solutions that include people with
disabilities is increasing with the work of organisations that teach and foster
support for the disabled community, such as the IGF Dynamic Coalition
on Accessibility and Disability,13 the Internet Society Disability and Special
Needs Chapter,14 and the International Center for Disability Resources on the
Internet.15
159
Internet Governance
The lack of accessibility arises from the gap between the abilities required to
use hardware, software, and content, and the available abilities of a person
with a disability. To narrow this gap there are two directions of policy actions:
P Include accessibility standards in the requirements for the design and
development of equipment, software, and content.
P Foster the availability of accessories in hardware and software that
increase or substitute the functional capabilities of the person.
In the field of Internet governance, the main focus is on web content, as it
is in rapid development and constitutes a kind of infrastructure. Many web
applications do not comply with accessibility standards due to a lack of
awareness or perceived complexity and high costs (which is far from todays
reality). International standards in web accessibility are developed by W3C
within its Web Accessibility Initiative.16
Content policy
One of the main sociocultural issues is content policy, often addressed from
the standpoints of human rights (freedom of expression and the right to
communicate), government (content control), and technology (tools for
content control). Discussions usually focus on three groups of content.
P Content that has a global consensus for its control. Included here
are child pornography, 17 justification of genocide, and incitement or
organisation of terrorist acts.
P Content that is sensitive for particular countries, regions, or ethnic groups
due to their particular religious and cultural values. Globalised online
communication poses challenges for local, cultural, and religious values
in many societies. Most content control in Middle Eastern and Asian
countries is officially justified by the protection of specific cultural values.
This often means that access to pornographic and gambling websites is
blocked.18
P Political censorship on the Internet. Reporters without Borders issues
annual reports on freedom of information on the Internet. Till 2012
the report used to list countries that run censorship and surveillance
programmes. The 2014 Report focuses on institutions that run censorship
and surveillance activities.19
160
The sociocultural basket
161
Internet Governance
The risk of filtering of search results, however, doesnt come only from the
governmental sphere; commercial interests may interfere as well, more or
less obviously or pervasively. Commentators have started to question the role
of search engines (particularly Google, considering its dominant position in
users preferences) in mediating user access to information and to warn about
their power of influencing users knowledge and preferences.26
International initiatives
At international level, the main initiatives arise in European countries with
strong legislation in the field of hate speech, including anti-racism and anti-
Semitism. European regional institutions have attempted to impose these
rules on cyberspace. The primary legal instrument addressing the issue of
content is the CoE Additional Protocol to the Convention on Cybercrime,29
concerning the criminalisation of acts of a racist and xenophobic nature
committed through computer systems (2003). On a more practical level,
the EU introduced the EU Safer Internet programme which includes the
following main points:
162
The sociocultural basket
The issues
163
Internet Governance
Education
The Internet has opened new possibilities for education. Various e-learning,
online learning, and distance learning initiatives have been introduced; their
main aim is to use the Internet as a medium for the delivery of courses.
While it cannot replace traditional education, online learning provides new
possibilities for learning, especially when constraints of time and space impede
physical attendance in class.
164
The sociocultural basket
The issues
The forthcoming debate, likely to develop within the context of the WTO
and other international organisations, will focus on the dilemma of education
as a commodity or a public good. If education is considered a commodity,
the WTOs free trade rules will be implemented in this field as well. A public
goods approach, on the other hand, would preserve the current model of
education in which public universities receive special status as institutions of
importance for national culture.
Quality assurance
The availability of online learning delivery systems and easy entry into this
market has opened the question of quality assurance. A focus on online
delivery can overlook the importance of the quality of materials and didactics.
A variety of possible difficulties can endanger the quality of education.
One is the easy entry of new, mainly commercially driven, educational
institutions, which frequently have few of the necessary academic and
didactical capabilities. Another problem of quality assurance is that the simple
transfer of existing paper-based materials to an online medium does not take
advantage of the didactic potential of the new medium. This aspect prompted
education organisations to start to develop standards and guidelines for
evaluating the design and the content of lectures delivered online.35
165
Internet Governance
credit system the University Mobility in Asia and the Pacific (UMAP)
programme.37
The issues
Cyber-bullying
Harassment is a particular challenge when minors are targeted. Minors are
vulnerable when using the numerous communication tools such as messaging,
chat-rooms, or social networks. Children can easily become victims of cyber-
bullying, most often from their peers using ICT combining mobile phone
cameras, file-sharing systems, and social networks as a convenient tool.
166
The sociocultural basket
and can go as far as the abuse and exploitation of children, paedophilia, the
solicitation of minors for sexual purposes, and even child trafficking.
Violent games
The impact of violent games on the behaviour of young people is being widely
debated. The most infamous games involve sophisticated weapons (showing
features of real weapons, and/or other fantasy features) and bloodshed, and
are usually tagged as stress eliminators. The top 10 best-selling games for
different hardware platforms, including Microsoft Xbox, Nintendo DS,
Nintendo Wii, PC, Playstation, were dominated by action/violent games.39
167
Internet Governance
online world, etc. Several such initiatives exist worldwide, such as Cyber
Smart!,41 iKeepSafe,42 i-Safe,43 and NetSmartz.44
Since its early days, the Internet has been a predominantly English-language
medium. According to some statistics, approximately 56% of Web content is
in English,47 whereas 75% of the worlds population does not speak English.48
This situation has prompted many countries to take concerted action to
promote multilingualism and to protect cultural diversity. The promotion of
multilingualism is not only a cultural issue; it is directly related to the need
for the further development of the Internet.49 If the Internet is to be used by
wider parts of society and not just national elites, content must be accessible in
more languages.
168
The sociocultural basket
The issues
Non-Roman alphabets
The promotion of multilingualism requires technical standards that facilitate
the use of non-Roman alphabets. One of the early initiatives related to the
multilingual use of computers was undertaken by the Unicode Consortium a
non-profit institution that develops standards to facilitate the use of character
sets for different languages.50 In their turn, ICANN and the IETF took an
important step in promoting Internationalised Domain Names (IDN). IDN
facilitate the use of domain names written in Chinese, Arabic, and other non-
Latin alphabets.
Machine translation
Many efforts have been made to improve machine translation. Given its policy
of translating all official activities into the languages of all member states,
the EU has supported various development activities in the field of machine
translation. Although major breakthroughs have been made, limitations
remain.
The evolution and wide usage of Web 2.0 tools, allowing ordinary users to
become contributors and content developers, offers an opportunity for greater
availability of local content in a wide variety of languages. Nevertheless,
without a wider framework for the promotion of multilingualism, the
opportunity might end up creating an even wider gap, since users feel the
pressure of using the common language in order to reach a broader audience.
The concept of global public goods can be linked to many aspects of Internet
governance. The most direct connections are found in areas of access to the
169
Internet Governance
One of the key features of the Internet is that through worldwide interaction
of users, new knowledge and information are produced. Considerable
knowledge has been generated through exchanges on mailing lists, social
networks, and blogs. With the exception of creative commons,53 there is
no mechanism to facilitate the legal use of such knowledge. Left in a legal
uncertainty, it is made available for modification and commercialisation. This
common pool of knowledge, an important basis of creativity, is at risk of being
depleted. The more Internet content is commercialised, the less spontaneous
exchanges may become. This could lead towards reduced creative interaction.
The concept of global public goods, combined with initiatives such as creative
commons, could provide solutions that would both protect the current
Internet creative environment and preserve Internet-generated knowledge for
future generations.
The issues
170
The sociocultural basket
other Web 2.0 companies have tried to develop business models which both
provide income and enable the creative development of the Internet.
171
Internet Governance
Endnotes
1
The APC Internet Rights Charter includes Internet access for all; freedom of expression
and association; access to knowledge; shared learning and creation free and open source
software and technology development; privacy, surveillance and encryption; governance of
the Internet; awareness, protection and realisation of rights. Available at http://www.apc.
org/en/node/5677 [accessed 10 August 2014].
2
Borg-Psaila S (2011) Right to access the Internet: the countries and the laws that proclaim
it. Available at http://www.diplomacy.edu/blog/right-access-internet-countries-and-
laws-proclaim-it [accessed 10 August 2014].
3
CNN Tech (2010) First nation makes broadband access a legal right. Available at http://
articles.cnn.com/2010-07-01/tech/finland.broadband_1_broadband-access-internet-
access-universal-service?_s=PM:TECH [accessed 10 August 2014].
4
UN General Assembly (2011) Report of the Special Rapporteur on the promotion and
protection of the right to freedom of opinion and expression, Frank La Rue. Available at
http://www2.ohchr.org/english/bodies/hrcouncil/docs/17session/A.HRC.17.27_
en.pdf [accessed 10 August 2014]. For a discussion of the UN report see Wagner A (2012)
Is Internet access a human right? The Guardian. Available at http://www.guardian.co.uk/
law/2012/jan/11/is-internet-access-a-human-right [accessed 10 August 2014].
5
Council of Europe (2010) Convention for the Protection of Human Rights and
Fundamental Freedoms. Available at http://conventions.coe.int/treaty/en/treaties/
html/005.htm [accessed 10 August 2014].
6
The Council of Europe adopted the following main declarations of relevance for human
rights and the Internet: The Declaration on Freedom of Communication on the Internet
(28 May 2003). Available at https://wcd.coe.int/ViewDoc.jsp?id=37031 [accessed 10
August 2014]; The Declaration of Human Rights and the Rule of Law in the Information
Society (13 May 2005). Available at https://wcd.coe.int/ViewDoc.jsp?id=849061
[accessed 10 August 2014]. The Declaration on the Digital Agenda for Europe (29
September 2010). Available at https://wcd.coe.int/ViewDoc.jsp?Ref=Decl%2829.09.201
0_1%29&Language=lanEnglish&Ver=original [accessed 10 August 2014].
7
Council of Europe (2001) Convention on Cybercrime. Available at http://conventions.
coe.int/Treaty/en/Treaties/html/185.htm [accessed 30 April 2014].
8
United Nations (no date) The Universal Declaration of Human Rights. Available at http://
www.un.org/en/documents/udhr/ [accessed 30 April 2014].
9
Freedom House (2013) Freedom on the Net. A Global Assessment of Internet and Digital
Media. Available at http://freedomhouse.org/report/freedom-net/freedom-net-2013#.
Uz7L3VcZes1 [accessed 4 April 2014].
10
Valuable comments and input were provided by Jorge Plano.
11
UN Enable (no date) Factsheet on Persons with Disabilities. Available at http://www.
un.org/disabilities/default.asp?id=18 [accessed 4 April 2014].
172
The sociocultural basket
12
Convention on the Rights of Persons with Disabilities. Available at http://www.un.org/
disabilities/default.asp?navid=14&pid=150 [accessed 30 April 2014].
13
IGF, Dynamic coalition on accessibility and disability. Available at http://www.
intgovforum.org/cms/index.php/dynamic-coalitions/80-accessibility-and-disability
[accessed 30 April 2014].
14
ISOC Disability and Special Needs Chapter. Available at http://www.isocdisab.org/
[accessed 30 April 2014].
15
ICDRI. Available at http://www.icdri.org/ [accessed 30 April 2014].
16
WAI. Available at http://www.w3.org/WAI/ [accessed 30 April 2014].
17
Zick T (1999) Congress, the Internet, and the intractable pornography problem: the Child
Online Protection Act of 1998, Creighton Law Review, 32, pp. 1147, 1153, 1201. Available
at http://scholarship.law.wm.edu/cgi/viewcontent.cgi?article=1873&context=facpubs
[accessed 2 April 2014].
18
For a discussion of Internet gambling, see: Girdwood S (2002) Place your bets ... on the
keyboard: Are Internet casinos legal? Campbell Law Review 25. Available at
http://scholarship.law.campbell.edu/cgi/viewcontent.cgi?article=1398&context=clr
[accessed 2 April 2014].
19
Reporters without Borders (2014). Enemies of the Internet. Available at http://12mars.rsf.
org/wpcontent/uploads/EN_RAPPORT_INTERNET_BD.pdf [accessed 10 August
2014].
20
The OpenNet Initiative has documented network filtering of the Internet by national
governments in over forty countries worldwide. See Noman H and York J (2011) West
Censoring East: The Use of Western Technologies by Middle East Censors, 2010-2011 OpenNet
Initiative Bulletin. Available at http://opennet.net/west-censoring-east-the-use-
western-technologies-middle-east-censors-2010-2011 [accessed 2 April 2014].
21
PICS has now been replaced by POWDER: http://www.w3.org/2009/08/pics_
superseded.html. Details about POWDER are available at http://www.w3.org/
standards/techs/powder#w3c_all [accessed 10 August 2014].
22
For an overview of available filtering types, see the National Academy of Sciences dedicated
page available at http://www.nap.edu/netsafekids/pro_fm_filter.html [accessed 2 April
2014].
23
Although Vint Cerf participated in the panel, he objected to the final report, which he
said did not focus on the flaws or the larger implications of installing online gates. Source:
Guernsey L (2001) Welcome to the world wide web, passport, please? New York Times, 15
March 2001. Available at http://www.nytimes.com/2001/03/15/technology/welcome-
to-the-web-passport-please.html?pagewanted=all&src=pm [accessed 2 April 2014].
24
Knight W (2002) On-off access for Google in China. New Scientist Internet edition, 13
September. Available at http://www.newscientist.com/article/dn2795-onoff-access-
for#.U-fUu2PCfMU [accessed 8 August 2014].
25
Drummond D (2010) An update on China, 28 June 2010. The Official Google Blog.
Available at http://googleblog.blogspot.com/2010/06/update-on-china.html [accessed
2 April 2014].
173
Internet Governance
26
A good starting point to this debate is Mary Murphys blog post on DiploFoundations
Internet Governance blog channel and the comments raised upon: Google...stop thinking for
me! Available at http://www.diplomacy.edu/blog/googlestop-thinking-me [accessed 10
April 2012].
27
Jiang Y (2011) Consumer Video Understanding: A Benchmark Database and An
Evaluation of Human and Machine Performance ICMR11. April 17-20, Trento, Italy.
Available at http://www.ee.columbia.edu/~yjiang/publication/icmr11-consumervideo.
pdf [accessed 2 April 2012].
28
Crete-Nishihata M and York J (2011) Egypts Internet Blackout: Extreme Example of
Just-in-time Blocking. OpenNet Initiative. Available at http://opennet.net/blog/2011/01/
egypt%E2%80%99s-internet-blackout-extreme-example-just-time-blocking [accessed
2 April 2014].
29
Council of Europe (2003) Additional Protocol to the Convention on Cybercrime,
concerning the criminalisation of acts of a racist and xenophobic nature committed through
computer systems. Available at http://conventions.coe.int/Treaty/en/Treaties/html/189.
htm [accessed 30 April 2014].
30
EU Information Society (no date) Safer Internet action plan. Available at http://ec.europa.
eu/information_society/activities/sip/index_en.htm [accessed 8 August 2014].
31
Lessig L (1996) The Zones of Cyberspace. Stanford Law Review 48 pp. 1403, 1405.
32
Steve A (no date) Church of Scientology censors net access for members. Available at
http://www.xenu.net/archive/events/censorship [accessed 2 April 2012].
33
GATS. Available at http://www.wto.org/english/res_e/booksp_e/analytic_index_e/
gats_01_e.htm#article1A [accessed 30 April 2014].
34
For a comprehensive study of the interpretation of GATS related to higher education see
Tilak J (2011) Trade in higher education: The role of the General Agreement on Trade in Services
(GATS). UNESCO: International Institute for Educational Planning, Paris. Available at
http://unesdoc.unesco.org/images/0021/002149/214997e.pdf [accessed 3 April 2014].
35
For a sample list of organisations and works dealing with recommendations and standards
for e-learning see Bates T (2010) E-learning quality assurance standards, organizations
and research. Available at http://www.tonybates.ca/2010/08/15/e-learning-quality-
assurance-standards-organizations-and-research/ [accessed 3 April 2014].
36
European Commission (no date) ECTS. Available at http://ec.europa.eu/education/
tools/ects_en.htm [accessed 3 April 2014].
37
UMAP (no date) UMAP. Available at http://www.umap.org/en/cms/detail.php?id=106
[accessed 3 April 2014].
38
This text was prepared by Vladimir Radunovic for the advanced thematic course on
Cybersecurity (Internet Governance Capacity Building Programme DiploFoundation).
39
Reilly J (2012) The Best-Selling U.S. Games Of 2011. gameinformer. Available at http://www.
gameinformer.com/b/news/archive/2012/01/12/these-are-the-10-best-selling-u-s-
games-in-2011.aspx [accessed 12 April 2014].
174
The sociocultural basket
40
Insafe. Available at http://www.saferinternet.org/web/guest/home [accessed 30 April
2014].
41
CyberSmart. Available at http://www.cybersmart.org/ [accessed 30 April 2014].
42
IKeepSafe. Available at http://www.ikeepsafe.org/ [accessed 30 April 2014].
43
I-Safe. Available at http://www.isafe.org/ [accessed 30 April 2014].
44
NetSmartz. Available at http://www.netsmartz.org/Parents [accessed 30 April 2014].
45
EU2009. Prague Declaration for a Safer Internet for Children. Available at http://
ec.europa.eu/information_society/activities/sip/docs/events/prague_decl.pdf [accessed
30 April 2014].
46
ITU (no date) Global Cybersecurity Agenda. Available at http://www.itu.int/osg/csd/
cybersecurity/gca/ [accessed 30 April 2014].
47
W3Techs (2014) Usage of content languages for websites. Available at http://w3techs.
com/technologies/overview/content_language/all [accessed 3 April 2014].
48
British Council (no date) How many people speak English. Available at http://www.
britishcouncil.org/learning-faq-the-english-language.htm [accessed 10 August 2014].
49
For more information regarding multilingualism on the Internet please consult the
following study: AlShatti Q, Aquirre R and Cretu V (2007) Multilingualism the
communication bridge. DiploFoundations Internet Governance Research Project, 2006/2007.
Available at http://textus.diplomacy.edu/thina/TxFsetW.asp?tURL=http://textus.
diplomacy.edu/thina/txgetxdoc.asp?IDconv=3241 [accessed 3 April 2014].
50
Unicode Consortium. Available at http://unicode.org/ [accessed 30 April 2014].
51
UNESCO (2001) Universal Declaration on Cultural Diversity. Available at http://
portal.unesco.org/en/ev.php-URL_ID=13179&URL_DO=DO_TOPIC&URL_
SECTION=201.html [accessed 30 April 2012].
52
European Commission (no date) Languages. Available at http://ec.europa.eu/languages/
index_en.htm [accessed 10 August 2014].
53
Creative Commons is a non-profit organisation that develops, supports, and stewards
legal and technical infrastructure that maximizes digital creativity, sharing, and innovation.
Available at http://creativecommons.org/ [accessed 3 April 2014].
54
For more information regarding the Internet as a global public good, please consult the
following study: Seiiti A and Psaila S (2006) The Protection of the Public Interest with regards
to the Internet. DiploFoundations Internet Governance Research Project, 2005/2006.
Available at http://archive1.diplomacy.edu/poolbin.asp?IDPool=128 [accessed 3 April
2014].
175
Internet Governance
176
Section 7
Internet
governance
actors
Internet Governance
178
Internet governance actors
Internet governance
actors
A
t the moment, Internet governance involves a wide variety of actors, or
stakeholders, as they are often called. Internet actors include national
governments, international organisations, the business sector, civil
society, and the technical community (as specified in the Article 49 of the
2005 Tunis WSIS Declaration). While multistakeholderism is adopted as a
principle, the main debate is on the specific role of each actor, focusing mainly
on the relation between state and non-state actors.
Governments
179
Internet Governance
National coordination
In 2003, at the beginning of the WSIS process, most countries addressed
Internet governance issues through telecommunication ministries, usually those
that had been responsible for relations with the ITU. Gradually, as they realised
that Internet governance was more than wires and cables, governments started
involving officials from other ministries, such as those of foreign affairs, culture,
media, and justice.
The principal challenge for many governments has been to develop a strategy
to gather and effectively coordinate support from non-state actors such as
universities, private companies, and NGOs that often have the necessary
expertise to deal with Internet governance issues. In the years after WSIS 2003,
most big and medium-sized G20 countries have managed to develop sufficient
institutional capacity to follow global Internet governance negotiations. Some
of them, such as Brazil, have developed an innovative national structure for
following the Internet governance debate, involving telecom ministries, the
diplomatic service, the business sector, civil society, and academia.1
Policy coherence
Given the multidisciplinary nature of Internet governance and the great
diversity of actors and policy forums, it is particularly challenging to achieve
policy coherence. For example, the question of data protection and privacy is
addressed from human rights, trade, standardisation, and security perspectives,
among others. Achieving policy coherence in the field of Internet governance
requires a flexible form of policy coordination, including horizontal
communication between different ministries, the business sector, and other
actors.
Cable geo-strategy and policy (in)coherence
180
Internet governance actors
For large and developed countries, the permanent missions were part of the
broad network of institutions and individuals that dealt with the WSIS and
Internet governance processes. For small and developing countries, permanent
missions were the primary and, in some cases, the only players in the processes.
Internet governance issues have added to the agenda of the usually small and
over-stretched missions of developing countries. In many cases, the same
diplomat had to undertake the tasks associated with WSIS along with other
issues such as human rights, health, trade, and labour.
Positions of governments
United States
The Internet was developed as part of a US-government-sponsored scientific
project. From the origin of the Internet until today, the US government
has been involved in Internet governance through various departments and
agencies, initially, the Department of Defense, later the National Science
Foundation, and most recently the Department of Commerce. The FCC has
also played an important role in creating the Internet regulatory framework.
181
Internet Governance
the governance of the Internet to those directly working with it, mainly the
technical community. However, the US government has intervened more
directly on a few occasions, as occurred in the mid-1990s when the CORE
project could have moved the root server and management of the core Internet
infrastructure from the USA to Geneva. This process was stopped by a famous
(at least in the history of the Internet) diplomatic note sent by US Secretary
of State Madeleine Albright to the ITU Secretary General.4 In parallel to
stopping the CORE initiative, the US government initiated consultations that
resulted in the establishment of ICANN.
European Union
The European Union has a unique mix of hard and soft digital power for
forging future Internet governance compromise. The EUs hard digital power
is based on the attraction of a wealthy 500-million-person market with high
Internet penetration (73%).7 As the concentration of the Internet industry
lobby in Brussels shows, this type of hard power matters. By negotiating with
the EU on anti-monopoly and data protection issues, Google and Facebook,
among others, negotiate with the rest of the world (the EUs arrangements
with the Internet industry often inspire other countries and regions to take
similar action). In a situation when, for example, Google controls more
than 90% of the European search market, the EU is the only international
institution that could effectively address the risk of Googles market monopoly.8
The EUs soft digital power is based on some sort of digital aikido diplomacy
of turning weaknesses into strengths. Namely, the EU does not have any major
Internet company since Skype was bought by Microsoft. Paradoxically, this
weakness could be turned into a strength in Internet governance.
Without the need to protect the economic interests of the Internet industry,
the EU has more freedom to promote and protect public interests (user rights,
inclusion, network neutrality). In this way, the EU can become the guardian of
182
Internet governance actors
Internet users, and the promoter of an enabling environment for the growth of
the EUs (and the worlds) Internet industry. The EU can achieve both ethical
and strategic goals, which is not often the case in international politics.
Brazil
Brazil has been one of the most active countries in global digital politics.
As a democratic and developing country with a vibrant digital space, Brazil
has great potential to facilitate a compromise between the two camps in the
Internet governance debate (inter-governmental and non-governmental).
This role became obvious in the aftermath of the Snowden revelations. Brazil
took strong diplomatic action. In her speech at the 68th Session of the United
Nations General Assembly, Brazilian president Dilma Rousseff made this
request: [t]he United Nations must play a leading role to regulate the conduct
of states with regard to these technologies. In addition, she defined the
surveillance as a breach of international law and a case of disrespect to the
national sovereignty of Brazil.9 When it seemed that Brazil was insisting on
an inter-governmental approach, President Rousseff shifted back to the middle
of the policy spectrum by proposing to co-organise a NETmundial aimed at
further developing multistakeholder Internet governance. Brazil had a complex
role to play where its main aim was to ensure a successful outcome of the
meeting.
China
With the highest number of Internet users, China is an important player
in Internet governance. It has been balancing digital politics between the
economy-driven free communication with the rest of the world and politically
183
Internet Governance
driven filtered access to the Internet for Chinese users. The protection of
sovereignty as a cornerstone of Chinese foreign policy is also mirrored in
cyberspace. Adam Segal, reporting on a speech by Lu Wei, Minister of Chinas
State Internet Information Office, to the Second China-South Korea Internet
Roundtable, quotes Wei: Just as the seventeenth century saw the extension
of national sovereignty over parts of the sea, and the twentieth over airspace,
national sovereignty is now being extended to cyberspace [] but cyberspace
cannot live without sovereignty.11
India
India is one of the swing countries in the Internet governance debate
with diverse sometimes conflicting positions. Indias complex Internet
governance policy reflects the complexity of its national digital policy-making.
It has one of the most diverse and vibrant civil society scenes in global Internet
governance. Its diplomatic service inclines towards an inter-governmental
approach to Internet governance. Its business sector is closer to a non-
governmental approach to Internet governance. This dichotomy has created
some surprising moves. For example, India proposed the establishment of the
UN Committee for Internet-Related Policies (CIRP) as a way to achieve inter-
governmental oversight of critical Internet resources. It shifted to the other
side of the Internet policy spectrum, however, by siding with the USA and
other developed countries at WCIT-12. India did not sign the amended ITRs
and departed from the position of the G77 countries. This surprising move was
explained by the considerable lobbying power of the Indian ICT industry.
Russia
Russia has been the most vocal and consistent promoter of an inter-
governmental approach to Internet governance. At WCIT-12, Russia tried to
include the Internet in the ITUs work through the ITRs. It also has a strong
focus on cybersecurity through the work of the first committee of the UN
General Assembly.
184
Internet governance actors
Small states
The complexity of the issues and the dynamics of activities made it almost
impossible for many small and, in particular, small developing countries, to
follow Internet governance policy processes. As a result, some small states
have supported a one-stop-shop structure for Internet governance issues.12
The sheer size of the agenda and the limited policy capacity of developing
countries in both their home countries and in their diplomatic missions
remains one of the main obstacles for their full participation in the process.
The need for capacity building in the field of Internet governance and policy
was recognised as one of the priorities for the WSIS Tunis Agenda for the
Information Society.
When ICANN was established in 1998, one of the main concerns of the
business sector was the protection of trademarks. Many companies were faced
with cybersquatting and the misuse of their trademarks by individuals who
were fast enough to register them first. In the process of creating ICANN,
business circles clearly prioritised dealing with the protection of trademarks
and, accordingly, this issue was immediately addressed once ICANN was
created, by the establishment of the Universal Dispute Resolution Procedures
(UDRP).
185
Internet Governance
The International Chamber of Commerce (ICC), well known as the main association
representing business across sectors and geographic borders, positioned itself
as one of the main representatives of the business sector in the global Internet
governance processes. The ICC was actively involved in the early WGIG negotiations
and WSIS, and continues to be an active contributor in the current IGF process.
Today, with the growth of the Internet, the interest of business in Internet
governance has become wide and diverse, with the following main groups
of business companies: domain name companies, ISPs, telecommunication
companies, and Internet content companies.
Domain-name companies
Domain-name companies include registrars and registries who sell Internet
domain names (e.g. .com and .net). The main actors in this sector include
VeriSign and Afilias. Their business is directly influenced by ICANNs
policy decisions in areas such as the introduction of new domains and
dispute resolution. It makes them one of the most important actors in the
ICANN policy-making process. They have also been involved in the broader
Internet governance policy process (WSIS, WGIG, the IGF) with the main
objective of reducing the risk of a potential take-over of ICANNs role by
intergovernmental organisations.
Telecommunication companies
These companies facilitate Internet traffic and run the Internet infrastructure.
The main actors include companies such as Verizon and AT&T. Traditionally,
telecommunication companies have been participating in international
telecommunication policy through the ITU. They have been increasingly
involved in the activities of ICANN and the IGF. Their primary interest in
186
Internet governance actors
Civil society
Civil society has been the most vocal and active promoter of a multistakeholder
approach to Internet governance. The usual criticism of civil society participation
in previous multilateral forums had been a lack of proper coordination and the
presence of too many, often dissonant, voices. In the WSIS process, however,
civil society representation managed to harness this inherent complexity
and diversity through a few organisational forms, including a Civil Society
Bureau, the Civil Society Plenary, and the Content and Themes Group. Faced
with limited possibilities to influence the formal process, civil society groups
developed a two-track approach. They continued their presence in the formal
process by using available opportunities to participate and to lobby governments.
In parallel, they prepared a Civil Society Declaration as an alternative vision to
the main declaration adopted at the Geneva WSIS.16
NGOs and WSIS
NGO participation in WSIS was relatively low. Out of close to 3000 NGOs that have
consultative status with the UN ECOSOC, only 300 participated in WSIS.
187
Internet Governance
Recently, there has been division among civil society organisations concerning
protection of the global public interest. Some members of civil society, in
particular from developing countries, see a stronger government role as a
way to counterbalance the enormous power of the Internet industry. Civil
society from developed countries, on the other hand, often allies itself with the
Internet industry and the technical community, especially on the issue of the
free flow of data.
International organisations
The ITU was the central international organisation in the WSIS process. It
hosted the WSIS Secretariat and provided policy input on the main issues.
ITU involvement in the WSIS process was part of its ongoing attempt
to define and consolidate its new position in the fast-changing global
telecommunications arena, increasingly shaped by the Internet. The ITUs
role has been challenged in various ways. It was losing its traditional policy
domain due to the WTO-led liberalisation of the global telecommunications
market. The latest trend of moving telephone traffic from traditional
telecommunications to the Internet (through VoIP) further reduced the ITUs
regulatory footprint on the field of global telecommunications.
188
Internet governance actors
The possibility that the ITU might have emerged from the WSIS process as
the de facto International Internet Organisation caused concern in the USA
and in some other developed countries, while garnering support in some
developing countries. Throughout WSIS, this possibility created underlying
policy tensions. It was particularly clear in the field of Internet governance,
where tension between ICANN and the ITU had existed since the
establishment of ICANN in 1998. WSIS did not resolve this tension. With
the increasing convergence of various communication technologies, it is very
likely that the question of the ITUs more active role in the field of Internet
governance will remain on the global policy agenda; it is already active in the
field of cybersecurity.
Terminology
189
Internet Governance
The technical community has been an important actor in the process of both
establishing and running ICANN. One of the fathers of the Internet, Vint
Cerf, was the Chair of the ICANN Board from 2000 to 2007. Members
of the technical community hold important positions in various ICANN
decision-making bodies.
Nowadays, with almost three billion users, the Internet has outgrown the
ICANN-based policy framework focusing on the technical community as the
main constituency. Following this argument, as the line between citizens and
Internet users blurs, greater involvement of governments and other structures
representing citizens is required, rather than those representing Internet users
only, frequently described as the technical community. Those who argued for
more government involvement in Internet governance used this approach of
representing citizens rather than Internet users and communities.
190
Internet governance actors
the technical community has faced frequent challenge. It is very likely that
the members of the technical community will gradually integrate into the
core stakeholder groups, mainly civil society, business, and academia but also
governments.
While ICANN is one of the main actors in the Internet governance field,
it does not govern all aspects of the Internet. It is sometimes, although
erroneously, described as the Internet government. ICANN manages the
Internet infrastructure, but it does not have direct authority over other
Internet governance issues, such as cybersecurity, content policy, copyright
protection, protection of privacy, maintenance of cultural diversity, or bridging
the digital divide.
191
Internet Governance
The issues
Critics of this assertion usually point to the fact that no technically neutral
solutions exist. Ultimately, each technical solution or decision promotes
192
Internet governance actors
certain interests; empowers certain groups; and affects social, political, and
economic life. The debate on issues such as the .xxx (adult materials) clearly
illustrated that ICANN has to deal with public policy aspects of technical
issues. The final statement from the NETmundial meeting recommends
that further discussions related to ICANN and IANA address the adequate
relation between the policy and operational aspects.10 Dealing with the new
gTLDs will push ICANN further towards addressing public policy issues.
The second criticism of special ICANN-USA ties rests on practical and legal
considerations. Since ICANN is a US-based legal entity, it has to obey US
law. Some of these laws may affect the regulation of ICANNs global facilities.
Critics of the USAs role usually quote an example of sanctions: If the US
judiciary exercises its role and properly implements the sanctions regime
against Iran and Cuba, it could force ICANN as a US private entity to
remove country domains for those two countries from the Internet. According
to this argument, by retaining the Iranian and Cuban domain names, ICANN
is breaching US sanctions law. While removal of country domain names
has never happened, it remains a possibility given the current legal status of
ICANN.
Next steps
A new phase of the status of ICANN was initiated by the NTIA
announcement on 14 March 2014. Both key issues dealing with public
policy matters and globalisation could be settled by changing the status of
ICANN, which would reduce the ambiguities and improve the clarity of its
193
Internet Governance
194
Internet governance actors
Endnotes
1
The Brazilian model of the management of its country domain name is usually taken as a
successful example of a multistakeholder approach. The national body in charge of Brazilian
domains CGI is open to all users, including government authorities, the business sector,
and civil society. Brazil gradually extended this model to other areas of Internet governance,
especially in the process of the preparation for IGF 2007, which was hosted in Rio de
Janeiro.
2
Graud A (1954) The rise and fall of the Anglo-French Entente. Foreign Affairs. Available
at http://www.foreignaffairs.com/articles/71095/andre-geraud-pertinax/rise-and-fall-
of-the-anglo-french-entente [accessed 15 August 2014].
3
Lesage C (1915) La rivalite franco-britannique. Les cables sous-marins allemands Paris. p.
257258; quoted in: Headrick D (1991) The Invisible Weapon: Telecommunications and
International Politics 18511945 Oxford: Oxford University Press. p. 110.
4
US Secretary of State criticising the ITU for the initiative: without authorization of
member governments to hold a global meeting involving an unauthorized expenditure of
resources and concluding international agreements. Quoted in Drake W. (2004) Reframing
Internet Governance Discourse: Fifteen Baseline Propositions, p. 9. Available at http://www.
un-ngls.org/orf/drake.pdf [accessed 14 August 2014].
5
ICANN (no date) Affirmation of Commitments. Available at https://www.icann.org/
resources/pages/aoc-2012-02-25-en [accessed 15 August 2014].
6
ICANN (2014) Administrator of the Domain Name System launches global
multistakeholder accountability process. Available at https://www.icann.org/resources/
press-material/release-2014-03-14-en [accessed 15 August 2014].
7
Internet World Stats (no date) Internet usage in the European Union. Available at http://
www.internetworldstats.com/stats9.htm [accessed 14 August 2014].
8
EU Commission (2013) Antitrust: Commission seeks feedback on commitments offered by
Google to address competition concerns. European Commission IP/13/371. Available at
http://europa.eu/rapid/press-release_IP-13-371_en.htm [accessed 15 August 2014].
9
Rousseff D (2013) Statement by H. E. Dilma Rousseff, president of the Federative
Republic of Brazil, at the opening of the general debate of the 68th Session of the United
Nations General Assembly. Available at http://www.un.int/brazil/speech/13d-PR-DR-
68-AG-Abertura-Ing.html [accessed 14 August 2014].
10
NETmundial (2014) NETmundial Multistakeholder Statement. Available at http://
netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-
Document.pdf [accessed 15 August 2014].
11
Segal A (2013) Cyberspace cannot live without sovereignty, says Lu Wei. Available at
http://blogs.cfr.org/asia/2013/12/10/cyberspace-cannot-live-without-sovereignty-
says-lu-wei/#cid=soc-twitter-at-blogs-cyberspace_cannot_live_without-121013
[accessed 14 August 2014].
195
Internet Governance
12
The convenience of one-stop shopping was one of the arguments for establishing the ITU
as the central Internet governance player.
13
WSIS (2003) Declaration of principles. Available at http://www.itu.int/wsis/docs/
geneva/official/dop.html [accessed 15 August 2014].
14
Valuable comments were provided by Ayesha Hassan.
15
ETNO Website (no date) European Telecommunications Network Operators Association.
Available at https://www.etno.eu/ [accessed 15 August 2014].
16
WSIS Civil Society Plenary (2003) Shaping information societies for human needs.
Available at http://www.itu.int/wsis/docs/geneva/civil-society-declaration.pdf
[accessed 15 August 2014].
17
The technical community fulfils all the criteria in Peter Haass definition of an epistemic
community: a professional group that believes in the same cause and effect relationships,
truth tests to accept them, and shares common values; its members share a common
understanding of the problem and its solutions. Haas P (1990) Saving the Mediterranean:
the politics of international environmental co-operation. New York: Columbia University Press,
p. 55.
18
The technology company Network Solutions www.networksolutions.com was founded
in 1979. The domain name registration business was the most important division of the
company; the company diversified its portfolio to include web services for small businesses.
19
ICANN (no date) ALAC. Available at http://atlarge.icann.org/alac [accessed 15 August
2014].
20
Esther Dysons response to Ralph Naders Questions (15 June 1999). Available at http://
www.icann.org/en/correspondence/dyson-response-to-nader-15jun99.htm [accessed
14 August 2014].
196
Section 8
Annex
Internet Governance
198
Annex
Annex
199
Internet Governance
The WHO axis of the cube focuses on the main ACTORS (states, international
organisations, civil society, the private sector). This is the multistakeholder aspect.
The WHERE axis of the cube deals with the FRAMEWORK in which
Internet issues should be addressed (self-regulatory, local, national, regional,
and global). This is a multileveled approach to Internet governance.
200
Annex
201
Internet Governance
The Federal Department of Foreign Affairs (EDA) and the Federal Office for
Telecommunications (BAKOM) have initiated the Geneva Internet Platform
(GIP), which fulfils the mission of an observatory, a capacity building centre
(online and in situ), and a centre for discussion. The GIP is hosted and
operated by DiploFoundation.
202
Annex
Since 1994, Dr Kurbalija has been teaching courses on the impact of ICT/
Internet on diplomacy and ICT/Internet governance. Currently, he is
visiting lecturer at the College of Europe in Bruges and the University of
St Gallen. He has lectured at the Mediterranean Academy of Diplomatic
Studies in Malta, the Vienna Diplomatic Academy, the Dutch Institute
of International Relations (Clingendael), the Graduate Institute of
International and Development Studies in Geneva, the UN Staff College,
and the University of Southern California. He conceptualised and currently
directs DiploFoundations Internet Governance Capacity Building
Programme (20052014). Dr Kurbalijas main research interests include
the development of an international regime for the Internet, the use of
the Internet in diplomacy and modern negotiations, and the impact of the
Internet on modern international relations.
jovank@diplomacy.edu
203
Internet Governance
204
The history of this book is long, in Internet time. The For easy reference: a list of frequently
original text and the overall approach, including used abbreviations and acronyms
the five-basket methodology, were developed
APEC Asia-Pacific Economic Co-operation
in 1997 for a training course on information
ccTLD country code Top-Level Domain
and communications technology (ICT) policy
CIDR Classless Inter-Domain Routing
for government officials from Commonwealth
DMCA Digital Millennium Copyright Act
countries. In 2004, Diplo published a print version
DNS Domain Name System
of its Internet governance materials, in a booklet
DRM Digital Rights Management
entitled Internet Governance Issues, Actors and
GAC Governmental Advisory Committee
Divides. This booklet formed part of the Information
Society Library, a Diplo initiative driven by Stefano gTLD generic Top-Level Domain
Baldi, Eduardo Gelbstein, and Jovan Kurbalija. HTML HyperText Markup Language
Special thanks are due to Eduardo Gelbstein, who IANA Internet Assigned Numbers Authority
made substantive contributions to the sections ICANN Internet Corporation for Assigned
Names and Numbers
dealing with cybersecurity, spam, and privacy, and
ICC International Chamber of Commerce
to Vladimir Radunovic, Ginger Paque, and Stephanie
aICT Information and Communications
Borg-Psaila who updated the course materials.
Technology
Comments and suggestions from other colleagues
IDN Internationalized Domain Name
are acknowledged in the text. Stefano Baldi, Eduardo
IETF Internet Engineering Task Force
Gelbstein, and Vladimir Radunovic all contributed
IGF Internet Governance Forum
significantly to developing the concepts behind
IP Internet Protocol
the illustrations in the book. In 2008, a special,
IPR Intellectual Property Rights
revised version of the book, entitled simply An
Introduction to Internet Governance, was published ISOC Internet Society
in cooperation with NIXI India on the occasion of ISP Internet Service Provider
the Internet Governance Forum (IGF) 2008 held in ITU International Telecommunication Union
Hyderabad, India. In 2009, a revised third edition IXP Internet eXchange Point
was published in the cooperation with the Ministry MoU Memorandum of Understanding
of Communication and Information Technology of OECD Organisation for Economic Co-operation
and Development
Egypt Internet Governance. The fourth edition (2010)
was produced in partnership with the Secretariat PKI Public Key Infrastructure
of the Africa-Caribbean-Pacific Group of Countries S&T Science and Technology
and the European Union. The fifth edition (2012) SGML Standard Generalized Markup Language
was published in cooperation with the Azerbaijan sTLD sponsored Top-Level Domain
Diplomatic Academy (ADA). TCP/IP Transmission Control Protocol/
Internet Protocol
TLD Top-Level Domain
TRIPS Trade-Related Aspects of Intellectual
Property Rights
UDHR Universal Declaration of Human Rights
UDRP Uniform Domain-Name Dispute-Resolution
Policy
UNECOSOC United Nations Economic and Social Council
UNCITRAL United Nations Commission on
International Trade Law
UNESCO United Nations Educational, Scientific
and Cultural Organization
VoIP Voice-over Internet Protocol
W3C World Wide Web Consortium
WGIG Working Group on Internet Governance
WIPO World Intellectual Property Organization
WSIS World Summit on the Information Society
XML eXtensible Markup Language
For easy reference: a list of frequently The history of this book is long, in Internet time. The
used abbreviations and acronyms original text and the overall approach, including
INTERNET
ccTLD country code Top-Level Domain
and communications technology (ICT) policy
CIDR Classless Inter-Domain Routing
for government officials from Commonwealth
DMCA Digital Millennium Copyright Act
countries. In 2004, Diplo published a print version
DNS Domain Name System
of its Internet governance materials, in a booklet
GOVERNANCE
DRM Digital Rights Management
entitled Internet Governance Issues, Actors and
GAC Governmental Advisory Committee
Divides. This booklet formed part of the Information
gTLD generic Top-Level Domain Society Library, a Diplo initiative driven by Stefano
HTML HyperText Markup Language Baldi, Eduardo Gelbstein, and Jovan Kurbalija.
IANA Internet Assigned Numbers Authority Special thanks are due to Eduardo Gelbstein, who
ICANN Internet Corporation for Assigned made substantive contributions to the sections
Names and Numbers
dealing with cybersecurity, spam, and privacy, and
Jovan Kurbalija
ICC International Chamber of Commerce
AN INTRODUCTION TO INTERNET GOVERNANCE Jovan Kurbalija to Vladimir Radunovic, Ginger Paque, and Stephanie
aICT Information and Communications
Borg-Psaila who updated the course materials.
Technology
Comments and suggestions from other colleagues
IDN Internationalized Domain Name
are acknowledged in the text. Stefano Baldi, Eduardo
IETF Internet Engineering Task Force
An Introduction to Internet Governance provides a comprehensive overview Gelbstein, and Vladimir Radunovic all contributed
IGF Internet Governance Forum
of the main issues and actors in this field. The book is written in a clear and significantly to developing the concepts behind
IP Internet Protocol
accessible way, supplemented with numerous figures and illustrations. It the illustrations in the book. In 2008, a special,
IPR Intellectual Property Rights
revised version of the book, entitled simply An
ISOC Internet Society focuses on technical, legal, economic, development, and sociocultural aspects
Introduction to Internet Governance, was published
ISP Internet Service Provider of Internet governance, providing a brief introduction, a summary of major in cooperation with NIXI India on the occasion of
ITU International Telecommunication Union questions and controversies, and a survey of different views and approaches the Internet Governance Forum (IGF) 2008 held in
IXP Internet eXchange Point for each issue. The book offers a practical framework for analysis and Hyderabad, India. In 2009, a revised third edition
Jovan Kurbalija
MoU Memorandum of Understanding was published in the cooperation with the Ministry
discussion of Internet governance.
OECD Organisation for Economic Co-operation of Communication and Information Technology of
and Development
Egypt Internet Governance. The fourth edition (2010)
PKI Public Key Infrastructure Since 1997 more than 1500 diplomats, computer specialists, civil society
was produced in partnership with the Secretariat
S&T Science and Technology activists, and academics have attended training courses based on the text and of the Africa-Caribbean-Pacific Group of Countries
SGML Standard Generalized Markup Language approach presented in this book. With every delivery of the course, materials and the European Union. The fifth edition (2012)
sTLD sponsored Top-Level Domain are updated and improved. This regular updating makes the book particularly was published in cooperation with the Azerbaijan
TCP/IP Transmission Control Protocol/ Diplomatic Academy (ADA).
Internet Protocol
useful as a teaching resource for introductory studies in Internet governance.
TLD Top-Level Domain
TRIPS Trade-Related Aspects of Intellectual
Property Rights
UDHR Universal Declaration of Human Rights
UDRP Uniform Domain-Name Dispute-Resolution
Policy
UNECOSOC United Nations Economic and Social Council
UNCITRAL United Nations Commission on
International Trade Law
UNESCO United Nations Educational, Scientific
and Cultural Organization
VoIP Voice-over Internet Protocol
6th Edition
W3C World Wide Web Consortium
WGIG Working Group on Internet Governance
WIPO World Intellectual Property Organization
WSIS World Summit on the Information Society
6th Edition
XML eXtensible Markup Language